0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)={0x98, r6, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x100000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0xc, 0xa, '*\x1e\\\x10+#*+'}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x401}, @NBD_ATTR_SOCKETS={0x34, 0x7, 0x0, 0x1, [{0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r3}]}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}]}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r12}]}]}, 0x98}}, 0x8004) sendmsg$ETHTOOL_MSG_WOL_SET(r3, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000400)={&(0x7f0000000840)=ANY=[@ANYBLOB="fc010000", @ANYRES16=0x0, @ANYBLOB="040027bd7000fbdbdf250a000000880102805600040010c8283467af6db48ba0633800cd5a45b8a902f2c489dc9434a430ff183d333c6d6cdfe39b8c95aeb7036bb76aa9876da95a5eab25b5598ed3c27b8d9f5425ba0584bb53ebc5c2f529856ef2d46b805265b761d394270018ad9abbd5b24e000026000500f8a8cedc9270e8c01da43223aa0895429eb8d46f6a6640a561b19652c5e7dc04555e000003010500ff7575e69466e3641e14d6e2ffdb70dc9e90f4099455cfcfde1eec2544cae40829bf2bef8f3f042cd917ff55a2240f5fb0a08a0b31609064e5eed679043233bf79aab63c58942e348d8daba42fe4def4c4cb2704069cdac0b42581b2b5b0f9c58e47a91f5a2da47d8f44ef7e7faec9e54c27beb9b28348fbb4666a5359e01f194169ec54d51e62d95de17f1d7331375128f3893ca19b2bdb43750c069c5381dda96518e275d3368d830428029e1bfe9eb8044028922a392e5659d392709659da1026a2a89ec69e6b64560fa5bf97c7493a9e7a64e8ac58ee7639b6d5bd43755050602169fa0b0c33da68b32f407b60c86293ff4e6126f007219ca6ba977e6210747acfeeea6f00600001801400020070696d72656730aeb52c48dda34ee8570000000000000000001400020069705f767469300000000000000000000800010027be508537fc3abc2116aba0654271cf16b38961eed440244a6617d6200f2416ed5e114b02b919909a8e8f46011843a31869024e916a780f66e78de58696334eca693cd1ca6d4fed441552cb95621940e97038636d280f78d72c2f895c2631c30b152324ef62ac103a9592765873963d272961efcd92499747c7c84878407295f3922eb18096aa512f0d2359016977e324ed5db2f48315581ab499b39ba86fc2aede108b172b0478384bbcab30003878b8d9313e17fbf500000026b46fb1ea8962488da9569ca81b1561af6701f247e7f36221b797711db33e0cabec5708e374bcf632a41e5e7d8869e4a0b977c63e647ecb2888d9d869914a91b15d7934425240e05fcad787fae59f1471851653b332d73b4c0ed6d6a6b1a1f850d93ca30b6926caa328db461976b568585e83507824523bb23a2fcd4637ca2b87ee73dc47f0635e3c8b641e2863ee9bef5e7195f7b237b041936f05c8962dd0ac6ced7a399f02264577bde9a9a4480af0cc33f80bb08d52365037904f3cf50c000a174ef4c1bc1e0e057ac735213c6f1e62c30afd78375a589098b852bd8563e5d7c9036dc8a62b15e8d6b8d88fd0d062631adc807d80efae5089554aaeeed9e1f43621c94b6d160e487e1a86", @ANYRES32=0x0, @ANYBLOB="0000100001000080d3e500000000", @ANYRES32=r5, @ANYBLOB], 0x1fc}}, 0x44000) 16:06:55 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4c4, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x1f4, 0x218, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x520) 16:06:55 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x0, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) (async, rerun: 64) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r3 = semget$private(0x0, 0x2, 0x400) semctl$GETVAL(r3, 0x3, 0xc, &(0x7f0000000440)=""/71) (async) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', 0x0, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r6 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r6, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async) r8 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r8, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r7, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) (async, rerun: 32) r10 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r10, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 32) ioctl$sock_inet6_SIOCDIFADDR(r10, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r10, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async) r12 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r11, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000001000)={0x400, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [{{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x8, 0x2, 0x6, 0x7}, {0x0, 0x7, 0xff, 0x200}, {0x21, 0x9, 0x1, 0x7}, {0x6, 0x9, 0xff, 0x2}, {0x7, 0x94, 0xd9, 0x3}, {0x5d, 0x5, 0x3, 0x1000}, {0x4, 0x0, 0x1}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1e5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r9}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x67e}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x60}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}]}, 0x400}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) (async, rerun: 32) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (rerun: 32) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797a746e6c3109000000000fb80180", @ANYRES32=0x0, @ANYBLOB="0080002000000080000000044322004c00640000b22f9078640101020a01010000862effffffff000d9f57be31bc91a0c149c60f0110a4d7e8d89f1f93351d85a58be52d0007d9d0ffff5405040254940400000194040100"]}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip_vti0\x00', 0x0, 0x40, 0x8000, 0x8, 0x6, {{0x15, 0x4, 0x2, 0x6, 0x54, 0x66, 0x0, 0x0, 0x0, 0x0, @broadcast, @private=0xa010100, {[@ssrr={0x89, 0x13, 0x32, [@dev={0xac, 0x14, 0x14, 0x1c}, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x20, 0x64, 0x0, 0x3, [0xf, 0x2, 0x8001, 0x34, 0xc8, 0xffffffff, 0x2]}, @generic={0x44, 0x9, "9c35886ad58c10"}]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x20, 0x7840, 0x7, 0x6, {{0x16, 0x4, 0x0, 0x0, 0x58, 0x65, 0x0, 0x7, 0x4, 0x0, @rand_addr=0x64010102, @private=0xa010102, {[@generic={0x82, 0xb, "a8ef48915a67a39d5a"}, @timestamp={0x44, 0xc, 0x3d, 0x0, 0x1, [0x80000001, 0x5]}, @timestamp_prespec={0x44, 0x2c, 0x97, 0x3, 0xa, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@dev={0xac, 0x14, 0x14, 0xe}}, {@private=0xa010101, 0x9}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x17b}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xe8, r1, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x20000804}, 0x40) 16:06:55 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4c4, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x1f4, 0x218, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x520) 16:06:55 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x0, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4c4, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x1f4, 0x218, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x520) 16:06:55 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r1 = openat$zero(0xffffff9c, &(0x7f0000000140), 0x200000, 0x0) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4800}, 0x4008840) (async) r3 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r3, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r3, 0x5304, &(0x7f0000000800)) (async) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000480), r4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) (async) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240), r4) (async) r7 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x4, 0x2) r8 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r8, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r8, 0x5304, &(0x7f0000000800)) r9 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r9, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r9, 0x5304, &(0x7f0000000800)) (async) r10 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r10, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r10, 0x5304, &(0x7f0000000800)) pipe2$watch_queue(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)={0x98, r6, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x100000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0xc, 0xa, '*\x1e\\\x10+#*+'}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x401}, @NBD_ATTR_SOCKETS={0x34, 0x7, 0x0, 0x1, [{0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r3}]}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8, 0x1, r1}]}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r12}]}]}, 0x98}}, 0x8004) sendmsg$ETHTOOL_MSG_WOL_SET(r3, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000400)={&(0x7f0000000840)=ANY=[@ANYBLOB="fc010000", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0000100001000080d3e500000000", @ANYRES32=r5, @ANYBLOB], 0x1fc}}, 0x44000) 16:06:55 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) semget$private(0x0, 0x2, 0x400) (async) r3 = semget$private(0x0, 0x2, 0x400) semctl$GETVAL(r3, 0x3, 0xc, &(0x7f0000000440)=""/71) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', 0x0, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r6 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r6, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) (async) r8 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r8, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r7, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r10 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r10, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r10, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r10, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) ioctl$sock_inet6_SIOCDIFADDR(r10, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r10, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r10, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r12 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r11, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000001000)={0x400, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [{{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x8, 0x2, 0x6, 0x7}, {0x0, 0x7, 0xff, 0x200}, {0x21, 0x9, 0x1, 0x7}, {0x6, 0x9, 0xff, 0x2}, {0x7, 0x94, 0xd9, 0x3}, {0x5d, 0x5, 0x3, 0x1000}, {0x4, 0x0, 0x1}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1e5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r9}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x67e}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x60}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}]}, 0x400}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) (async) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000001000)={0x400, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [{{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x8, 0x2, 0x6, 0x7}, {0x0, 0x7, 0xff, 0x200}, {0x21, 0x9, 0x1, 0x7}, {0x6, 0x9, 0xff, 0x2}, {0x7, 0x94, 0xd9, 0x3}, {0x5d, 0x5, 0x3, 0x1000}, {0x4, 0x0, 0x1}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1e5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r9}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x67e}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x60}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}]}, 0x400}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797a746e6c3109000000000fb80180", @ANYRES32=0x0, @ANYBLOB="0080002000000080000000044322004c00640000b22f9078640101020a01010000862effffffff000d9f57be31bc91a0c149c60f0110a4d7e8d89f1f93351d85a58be52d0007d9d0ffff5405040254940400000194040100"]}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797a746e6c3109000000000fb80180", @ANYRES32=0x0, @ANYBLOB="0080002000000080000000044322004c00640000b22f9078640101020a01010000862effffffff000d9f57be31bc91a0c149c60f0110a4d7e8d89f1f93351d85a58be52d0007d9d0ffff5405040254940400000194040100"]}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip_vti0\x00', 0x0, 0x40, 0x8000, 0x8, 0x6, {{0x15, 0x4, 0x2, 0x6, 0x54, 0x66, 0x0, 0x0, 0x0, 0x0, @broadcast, @private=0xa010100, {[@ssrr={0x89, 0x13, 0x32, [@dev={0xac, 0x14, 0x14, 0x1c}, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x20, 0x64, 0x0, 0x3, [0xf, 0x2, 0x8001, 0x34, 0xc8, 0xffffffff, 0x2]}, @generic={0x44, 0x9, "9c35886ad58c10"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x20, 0x7840, 0x7, 0x6, {{0x16, 0x4, 0x0, 0x0, 0x58, 0x65, 0x0, 0x7, 0x4, 0x0, @rand_addr=0x64010102, @private=0xa010102, {[@generic={0x82, 0xb, "a8ef48915a67a39d5a"}, @timestamp={0x44, 0xc, 0x3d, 0x0, 0x1, [0x80000001, 0x5]}, @timestamp_prespec={0x44, 0x2c, 0x97, 0x3, 0xa, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@dev={0xac, 0x14, 0x14, 0xe}}, {@private=0xa010101, 0x9}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x17b}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xe8, r1, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x20000804}, 0x40) 16:06:55 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x0, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x0, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000040)) inotify_add_watch(r0, 0x0, 0x80) 16:06:55 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x0, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000000040), 0x800c0, 0x0) openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x800, 0x0) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) sendmsg$inet6(r1, &(0x7f0000001640)={&(0x7f0000000080)={0xa, 0x4e24, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c, &(0x7f0000001440)=[{&(0x7f00000000c0)="b8b0799d71710d3aea61b7a0b9c67a116b948b7cf95eb3d1234cdc7a584e9a2a8c41a3861bdfa5753cbe6ee04aa67e5b228b1ff21d02d2dbaca9ef22e751e69da3bab88ad404ee8d833a6f8f19dfadd762e83ecc6b001c4f5c31f6166722ac6134866769a7fb082f3107bd61f22b0d7a057a36eef474ad9259433dbbb12e3659bb4b4aab5aa5e83b65f31640f2e4909471738f1f31e64d9f1596e4edc39deea5fa98bd86d7b471a3036fd6cb8a396b97b93c2b869211fec842a605f15e282cbd3b425e96921aa4662345a7af16220ac96d4446f058a6daa806ecbabded495ae0f863309a646f6dd5951d83bceb8193f53df5f0e8022bf0b1b726f6bee14c84744ff2b04b5df38fec061373a7ac64308292118dbb29c94cfe411363e6c2f3f553d8296c6d536f52fc726e0effc7d04086ab25bcab05f95ca15a4b5552102534a096591482cb342fc775a756f1e34a80ce28238b0414355ffd13d8cdbec50b11f4a127661bcb55c0bbec4b8e7cc58c377dc048985f62a22f61069f041543443af6f1597ffbd00845ebd7bbfcaed07740f4a306cd5657a4c07a479f1bd590d59f861782473e95ed2edc46f7d99fa2db5ebe8e284555fbc6c285e1612e5deeec7e0a7a0c14f79918ea6f8656a9499cd3a350e8ce08fd5fd464d18f33566c3ad828f309fa92d9429b938b0315a59971c68c376b24559e92b87f99766bd7d5801db9118d84687c34a3298885f921158a31f2b7bbc0bbadda37ac50a3814a2370929feabee01658bbb7226f11d3504a570e81be20114356682e80cf4d51b639b9079b95c2b7b5171f434b693c839dc28d67b4cced2b8ec9b95400b5183e4293c3c836387ea1c0fd7621704a5eca788685401c7d892da4607a7f27e308c8c6e6cb5fb6c4be63ceb43e08186c2075804ebbc29f5d81114c9cfda3e3f295c6dee4ffb614e4ae5b90a25b463144b5b62e34b53ead026f564fb33fb13c8b0d3d0d41c14f3d9245f592ed5104f6f48d9fc22189fb668385b1fa086c46aa43b2c4125b78d22d5e9c327a63a2480fcac5a5734951cb6d9a67991ac4c08f3aa822e70369365f6b86cf29aa2d53035b82094c36610eebb4724eb80bfb8d336b6b2f8aea7f3db6ef2ef919574dc87f9ed0954a3160467b5b0c2e05d16eff965f295ccb913d93b2ee7a2150aba7c5d60415edd00ea2bb4dfdd88ab2a0b7430ff5038f33417e0e11dc04be9d76ebbc494007c98ce5eef8f44bc94a0c5deac6c220b15ec2b03b797b93f4a6f69af8d0cc7c995216c88db60ce662e97b0fd3ad9aa973b776c79074ef6336b7969417d12d6a5999ebb7c12e80853c073a60a5d8bb43441d8375f43fc6334f2ad6711b08ff6c28d79bbad3cdf9ccfddbde54f5908166fd9391b40665c4f158dd04acca10b13281ffaf72e2d3b8c7d0656989d10763c3576ae17a041ff151841caed7afb1ef6b819ffb87a645941ef9af157fa6f315883de338aa244e8cf62e7f62b0a41378a2f2c2d9d48753e007d7fc0217b6222c512d03ecb76c396e6f6407c1de13099222623f026402031fe95a9e77ef3d5f456f7b80c5a58ebf745e8b5df32fd55b6c987afcb148ccaf01c897c4794a51236999e48813af568097de09aa606518a1e9323285ae0c0849fb3ab406ea4c0327509cc9eb0850829552a1a9199e932e17f904e6f6553854f729bb5061455f4d6bd2e38397db7f7a8a65b904dec837d6c64806a10f960afb345c44bc7cce36eb9a30e375f19d82853384bd8b61a99293fda9ed867213e06fc80521736929a1aa6ef4a4c748de937299e89d752cf60ce41839a7780d98153043ccf3c1da6b611660ee7a79bead3c48f5822763ef4103d1aaea0a15dda6593320b4107bdf7a6b1debbebc55b6d4354c5a813fa3097665bafe32f716d277360837a609d6fd21859fa2443a444a426b9b616fa6b98449a44240bbc779c7b727b47a73e7ac4468eebd09c6d8c705e73185839f2fc2b11bc712d0c1392f2eba74f5d1dca40d0e7bcf64af00138efe17eca0ba38755b05b19112d92b65899afaaa0bcf932b2b5cba56d63d0cfc931938d44766d32d7aedd7311b96acd9ac0f7dca776fd52f04103bb2fd99e7fa6464c0d18476c851ebb317c606b816ca358cb92b39921ae6a707707d402da71ca5fc39a4545f2c3bd80afd4173d8d84d3db2ff9fc2f21e24a4af8d9be49f5b7ec5fc838d55f7761b1d974c866a16cd16511578810a41c28002414436935310e79da792adbff7120ded7f8c457ccf1d40bc0428b608052151a40d92486d1dc18961f84d7c55f9882b2684d5d0378e0ec5da40d1e8b12f7f6955ce04ef9858c9f9abb271dc754070a2670ff50c0235abb89aa1d96f85668a762cc4c8d1ea3f21ee3d1be526ae644041abceed8ed9f7d16252906219f0c0a39314d2f4eef05749a6e64f3f886a802d1e881f8b90b243d686f945610583492e6af1f438295485309062c0bed44a0f4ddfd965765453e7cb197f1371c81b7fb07c57d5ff1aee5655e0b53edc3bc18b33c300469a9e943a318e13fa358e9b7e1b7c9d1e694bac45bb5be518317a2928ac22036de764622ca5fd8d5b067ec1b23b3298eccd38219afa4207ef97feb48eff4ee1abd4d7343c409759b1870275c5198677172137b37073e5889a989b4ff0a2977e9a197760a7c53a97fa0e7dbf21ed4a0692e5ec3025088784877c19de3356e35897d1d59a8262dfd6520ca5fc2a50eb82e17a12f8c0f2016f6fd625c906a52e7fa32a82d01c3738c1b451ed5d556d173ecc548d311d3215ac95fcfe7b5f665c185d77372fac1ec36e9d76f303de67da63f00d4899781b9e8be176e7882378f11c0dbb4af916be5fbe1c35b4a627b35aee5534da0354fa5a179600118254f50c81096611f419bcdf7aafe9e80a55b65f1fbb9c70dca037c5a74cce7cf46fab956a754f85e2591e686b63e2a9e9ff57b0333e1fe4fd49260a614d2d8af5890426e5afb3d4f1386430cec11bd090ce75a65552291504dc59e6939356dc61a201f2907558940f8cbeb097873a5b8d6e1547470b35fd16bc268a361b876374353d0be153195002fd3c5a9dfd08875ba0b358249ccd6529ab69008668ffcc9d0e373e6b0f26f7e21500af069826de2aeb584a3b12eb98a092a698300e31a7e7e681949b149d8b1b3fe30c557d7ead2dfbc9bc2b1c4d0f8ff9a5ca76e07aeb347381ceea58fc0f7e4531b63f6450fc4d1299a4b6e4dfa68a1b04fc7ba442e318e7685f29dce30ed2d4b64deb7ab0f0d125e809df76f857683ec0a32eba38536838733e7eab4b4eb3b227300a095152c523da9d8aa29ea40a12e9802829372db836de3115aa9273ccc962a61ed2164909a5065cfbe5caa12a46181a6eabfddc5cc49275eceff1bd4f366a6ce1c822f25a7d1e9f11f9c004d9cae7a4c9c9026483399118b42e6f982abcb9b4e63d994916af68d5f7af8c3aeafd3f444a35fbbd165aee9504f97302a16942c3b20d6a7592b794ae558d46da6756fb894a9e3376cfcc82d6e455894c4065cc3e933e8cf0c9d43087268100cdb124c66794d2975ce084de2153fcf2e791f1d87c1c82867616855f03b0656af4d07046a126158a1a02f3411848e067afc3c153c6b0cd929f3986fea62b7d69142b04e963e3e8782b503882006756ad280487012f40a4ae3c32d013d72e8cf3e4c7cf50b21281f0da753e15f6aa45ed97bac972a89d5edede546c91cd86498495c7c7247a3d1ee4989dffb2876562f7bfbbe72693ca589308311223b2308960cd5d87fc11b8b045176106138914617ea35ef8335207ac72eb64dae9c457d3136de151c71b0213c78fd21ad64e84ab837e724f2d0e0565068c8c8b0143e72d0e78defa50d55708e9cc1794aa2423ad2156662607921184f9c1e4e414cae11a539f0866f003591ba2002606df12db3fd103cbed7e63649d59f2fc94dd03be21621b92fbf25fe51c4f23844dc3cb13d75c4d0ad01f4c394cf4b4065a3d7d2a33790842695a84d4e2747986ba1a99bbc90985540f103ee16195a62719f5ad1db4653d21aa52770fbb90e2b0b39ffe2f2b9c7229f9859017627e3eed0fe3cbdb8aec77b2bfc5ed4cdf41f6c5bccbbaa96a57566a7e150ff4ee0eb6be850891fd5eba60fd7c8a544e03acfc40a551a25e7cd8148085b7071b0a020b3a3ca39d2cb20589b647795b7c3fd92b22430bff6ee947df3644f7e5ee185cd135d877d2334f4caec58b6a9cb9024162511f01ee32d8ea5eaf4867319e79fa44493633bb1de4b2fb214ecad05b13e97dfa75fcc8f851b27e5cc21ad741f364b9b08edbd7c16879bc000a31c899605b6f4deb29e2fc32240385d5bfa46d5091e1db19fc195859b1c4a305596aeb6dc2c381883122d2b380b96e0fa7edc261d23d4eb642411bbb96baa91a76a51178bd762b053b49aa0f9bf72ffa266efa9531a6680fb64f639a206ce36f9baba6a27d80312e272bac433aaf38068576badf7f7b7dc363f738137f835b53e2f8f76d1a5fee408570e8ab86bee8feabcbf9fc3fdecc547c802f5260a0e3d137c9890be4784950324ee3194ac05328f016b95b1d2e97b4109248f37f0fa65bbe3504d2b0fad0e760dd352b0e0896eb1f35f54d0a737575d1327893a648e5ab5a1fe1e3905c4a5dc0471c9c8710f454a1d17dceff4d58e43a549c0cbe94cf24dd1ceb088237d487dc608245e6ec0c2e19362e9fede7fb4f2e110f0bab03fed5ab16ac571da875853d20c77ab018eaaa986aeee52ea7a89653123d2653891f5e1301096562f8432ec91d80ecbe61a8287edb426a6bba0b0809f96b0c2b2ef221590c8a49b9b6f42cdbca27c0e72b3c03bcd4f89a5783db6fab525f254b7c18928a5a582e580535985d1ec04198d3926b92c35a8d134178e4eea2244de8a7683a75ba8689dff0916b52acaccbc48a9969624f2c074ad1872d1b0ed8cf91fd8018153df6fb52e2eb636ebafca04ae98dbc6ab32313886f7fd9795e3bef8c0b84203f6d38a1494b19c6172fae50a727cd9db3752ae4efcb98edfaecfa22263e586daf1e1057f9219064e3a93de3ebf5d8c70acb3448dab7104b5a10b0cff4ab7776cad33970013e06fc3d61eafa6a5a4b6607498fa79b67dfa9405b057975d166b57bf47ed762291da45e4c64efa5b04b3a3654f46e1e12861f058a85faa9bf6cd9f1173b9edab9a535eb062c8f10b103b1c5c65c1c2a94cff1453424d8848b31966da741bb5ed80c0c927e06e0dfba8bc0804dbb2b6ba6bc77d978da57fc42ee0911a33c17033e47b32d99b2c04517a18fa97050b73048ff48bbb646cc37a7fa341508f1a9877cffaf58c751137ec904068fcf1c7676cfa54e5aa6cd7b24a53d6fb462203d7277af054a6109c1ae740a2fec386a788016a0964646810ff18af905673c810e5d381bca3cdd0545e37966498469792d8591d6a0f62c9dbdf2925097fc0e9ee542ab9e71288f3cbed78a9697acbf2044e376b3d82eb6f590435006a686e82d2003e5c49ff15df88d8a69250787f8c27d25ba0e57f8fa58238474d42956215d76a5f29a638087d06ce7b5ed86101fb72885d508d446fa11d7920f86aec8721d79c5a0190d110caed4f16f35c9015b8c7062066e5f1fcfa55a69fe189ec18ab31d23afd485955a6598b9a56a6de4540ea8d20e4750ad98a5deef3838fa9b34b9096e2574db13e2762ef874aab6090da3482d63ebab02b8ed9d8f975c8e61e7fe757cac67026d1be8664fb711cf330eef347fea5b9ea86eaff26817ae80ea72c24a681282f342f311", 0x1000}, {&(0x7f00000010c0)="f45b559343cbdfe46537d915ad974364927b867b65cb1070f4445bf3cde8a6804ebb4a20222654c28518cf637ec8ca5babd604e4616990fd3dcb08dd079cb811eeb91cb0cd1ceb9bd3be8bec801fcbe3d7d526984fbc9fb51ef20136de44185c3bdff58b69372eb63ef4743056c4028b2cb8594a8fb8678cd2463630f57c32de758ef85719b9e0a44a5a", 0x8a}, {&(0x7f0000001180)="24a55725b1be8033ef997fabcdab83bf4a0ab5384ef3b5f8d130aacfda101b540e58257e5c8520f2e86178433256d928b68ff3e9fec1f850e49e3d16b90f37bbfbb9290b175e4bc9012139707d290898cc571b57dddc1d12691b3923417a4772e5a83dc022737026f373c69e88375b2ff4090aa658f03a2af292685b3daa89bf49ed93bf0963", 0x86}, {&(0x7f0000001240)="47df94befe2b282b60476a214aa2f1dc9ab5bf4feb296ef18de4f0031d6b5e949d04c8cf79d9252d3cd48b970e6e5de280319384128aecf827b11755f69ebe2a5507660f9c91316398312c5c3f9fc6d54d7556151e9ef4d0d669f438ed9370abe3cd276683b0ee2e4faef6d878798f732f1a6500fc2bc139cd3985fb7626771d9ea5443bb761a4118eca5faca980fd58aaa7d7a4c703a643bedfde8f6f502c9dc4cb0e4f61e1873bc445ac8f7b3c4978be6a4c8a2d68b1bbc615a2b171df721584b74a28c5bd0bac6aeff3", 0xcb}, {&(0x7f0000001340)="bb2b0890988f4dcf6201cb70ba19678f3b3619f0bfb89bdfe02b8a13aaa5778118f802bb164b21dd391f2c4204428ca944991706436e2020b7b8bd9849c91706906a2e338b9676ecc9b8c3bdd6cc0949186d8802b82c6ad48fbea99fb323120d9fdd7ff8a2703e28cc8d44eb54750ad1b8c6f40224d67724d185831b0c6ce9396a9e0fbb3e3f25492874c82aacb3d7a46ad64542bab108ec869a5025253e590fb9c46d68e5f7ca0278b989fa84fabdd9e31f706ce56ede04c8794bbbf3a2ab444263b87163cf2737806ff466a08544f93d9d0dc999d9dba647bfa0fabed31ad9885b5402bf827fb8a69f", 0xea}], 0x5, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="540009a915b775d765540000a208020000000000fe800000000000000000000000f678d2ae800000000000000000000000000001000000000000000000000000000120010000000000000000000000000002"], 0x18c}, 0x804) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x2000c050) 16:06:55 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000000040), 0x800c0, 0x0) (async) openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x800, 0x0) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) (async, rerun: 64) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) (async, rerun: 64) sendmsg$inet6(r1, &(0x7f0000001640)={&(0x7f0000000080)={0xa, 0x4e24, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c, &(0x7f0000001440)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="f45b559343cbdfe46537d915ad974364927b867b65cb1070f4445bf3cde8a6804ebb4a20222654c28518cf637ec8ca5babd604e4616990fd3dcb08dd079cb811eeb91cb0cd1ceb9bd3be8bec801fcbe3d7d526984fbc9fb51ef20136de44185c3bdff58b69372eb63ef4743056c4028b2cb8594a8fb8678cd2463630f57c32de758ef85719b9e0a44a5a", 0x8a}, {&(0x7f0000001180)="24a55725b1be8033ef997fabcdab83bf4a0ab5384ef3b5f8d130aacfda101b540e58257e5c8520f2e86178433256d928b68ff3e9fec1f850e49e3d16b90f37bbfbb9290b175e4bc9012139707d290898cc571b57dddc1d12691b3923417a4772e5a83dc022737026f373c69e88375b2ff4090aa658f03a2af292685b3daa89bf49ed93bf0963", 0x86}, {&(0x7f0000001240)="47df94befe2b282b60476a214aa2f1dc9ab5bf4feb296ef18de4f0031d6b5e949d04c8cf79d9252d3cd48b970e6e5de280319384128aecf827b11755f69ebe2a5507660f9c91316398312c5c3f9fc6d54d7556151e9ef4d0d669f438ed9370abe3cd276683b0ee2e4faef6d878798f732f1a6500fc2bc139cd3985fb7626771d9ea5443bb761a4118eca5faca980fd58aaa7d7a4c703a643bedfde8f6f502c9dc4cb0e4f61e1873bc445ac8f7b3c4978be6a4c8a2d68b1bbc615a2b171df721584b74a28c5bd0bac6aeff3", 0xcb}, {&(0x7f0000001340)="bb2b0890988f4dcf6201cb70ba19678f3b3619f0bfb89bdfe02b8a13aaa5778118f802bb164b21dd391f2c4204428ca944991706436e2020b7b8bd9849c91706906a2e338b9676ecc9b8c3bdd6cc0949186d8802b82c6ad48fbea99fb323120d9fdd7ff8a2703e28cc8d44eb54750ad1b8c6f40224d67724d185831b0c6ce9396a9e0fbb3e3f25492874c82aacb3d7a46ad64542bab108ec869a5025253e590fb9c46d68e5f7ca0278b989fa84fabdd9e31f706ce56ede04c8794bbbf3a2ab444263b87163cf2737806ff466a08544f93d9d0dc999d9dba647bfa0fabed31ad9885b5402bf827fb8a69f", 0xea}], 0x5, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="540009a915b775d765540000a208020000000000fe800000000000000000000000f678d2ae800000000000000000000000000001000000000000000000000000000120010000000000000000000000000002"], 0x18c}, 0x804) (async, rerun: 32) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x2000c050) (rerun: 32) 16:06:55 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000040)) inotify_add_watch(r0, 0x0, 0x80) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (async) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000040)) (async) inotify_add_watch(r0, 0x0, 0x80) (async) 16:06:55 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:55 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (async) r1 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000040)) (async) inotify_add_watch(r0, 0x0, 0x80) 16:06:56 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000000040), 0x800c0, 0x0) openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x800, 0x0) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) sendmsg$inet6(r1, &(0x7f0000001640)={&(0x7f0000000080)={0xa, 0x4e24, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c, &(0x7f0000001440)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="f45b559343cbdfe46537d915ad974364927b867b65cb1070f4445bf3cde8a6804ebb4a20222654c28518cf637ec8ca5babd604e4616990fd3dcb08dd079cb811eeb91cb0cd1ceb9bd3be8bec801fcbe3d7d526984fbc9fb51ef20136de44185c3bdff58b69372eb63ef4743056c4028b2cb8594a8fb8678cd2463630f57c32de758ef85719b9e0a44a5a", 0x8a}, {&(0x7f0000001180)="24a55725b1be8033ef997fabcdab83bf4a0ab5384ef3b5f8d130aacfda101b540e58257e5c8520f2e86178433256d928b68ff3e9fec1f850e49e3d16b90f37bbfbb9290b175e4bc9012139707d290898cc571b57dddc1d12691b3923417a4772e5a83dc022737026f373c69e88375b2ff4090aa658f03a2af292685b3daa89bf49ed93bf0963", 0x86}, {&(0x7f0000001240)="47df94befe2b282b60476a214aa2f1dc9ab5bf4feb296ef18de4f0031d6b5e949d04c8cf79d9252d3cd48b970e6e5de280319384128aecf827b11755f69ebe2a5507660f9c91316398312c5c3f9fc6d54d7556151e9ef4d0d669f438ed9370abe3cd276683b0ee2e4faef6d878798f732f1a6500fc2bc139cd3985fb7626771d9ea5443bb761a4118eca5faca980fd58aaa7d7a4c703a643bedfde8f6f502c9dc4cb0e4f61e1873bc445ac8f7b3c4978be6a4c8a2d68b1bbc615a2b171df721584b74a28c5bd0bac6aeff3", 0xcb}, {&(0x7f0000001340)="bb2b0890988f4dcf6201cb70ba19678f3b3619f0bfb89bdfe02b8a13aaa5778118f802bb164b21dd391f2c4204428ca944991706436e2020b7b8bd9849c91706906a2e338b9676ecc9b8c3bdd6cc0949186d8802b82c6ad48fbea99fb323120d9fdd7ff8a2703e28cc8d44eb54750ad1b8c6f40224d67724d185831b0c6ce9396a9e0fbb3e3f25492874c82aacb3d7a46ad64542bab108ec869a5025253e590fb9c46d68e5f7ca0278b989fa84fabdd9e31f706ce56ede04c8794bbbf3a2ab444263b87163cf2737806ff466a08544f93d9d0dc999d9dba647bfa0fabed31ad9885b5402bf827fb8a69f", 0xea}], 0x5, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="540009a915b775d765540000a208020000000000fe800000000000000000000000f678d2ae800000000000000000000000000001000000000000000000000000000120010000000000000000000000000002"], 0x18c}, 0x804) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x2000c050) openat$sr(0xffffff9c, &(0x7f0000000040), 0x800c0, 0x0) (async) openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x800, 0x0) (async) openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) (async) sendmsg$inet6(r1, &(0x7f0000001640)={&(0x7f0000000080)={0xa, 0x4e24, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c, &(0x7f0000001440)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="f45b559343cbdfe46537d915ad974364927b867b65cb1070f4445bf3cde8a6804ebb4a20222654c28518cf637ec8ca5babd604e4616990fd3dcb08dd079cb811eeb91cb0cd1ceb9bd3be8bec801fcbe3d7d526984fbc9fb51ef20136de44185c3bdff58b69372eb63ef4743056c4028b2cb8594a8fb8678cd2463630f57c32de758ef85719b9e0a44a5a", 0x8a}, {&(0x7f0000001180)="24a55725b1be8033ef997fabcdab83bf4a0ab5384ef3b5f8d130aacfda101b540e58257e5c8520f2e86178433256d928b68ff3e9fec1f850e49e3d16b90f37bbfbb9290b175e4bc9012139707d290898cc571b57dddc1d12691b3923417a4772e5a83dc022737026f373c69e88375b2ff4090aa658f03a2af292685b3daa89bf49ed93bf0963", 0x86}, {&(0x7f0000001240)="47df94befe2b282b60476a214aa2f1dc9ab5bf4feb296ef18de4f0031d6b5e949d04c8cf79d9252d3cd48b970e6e5de280319384128aecf827b11755f69ebe2a5507660f9c91316398312c5c3f9fc6d54d7556151e9ef4d0d669f438ed9370abe3cd276683b0ee2e4faef6d878798f732f1a6500fc2bc139cd3985fb7626771d9ea5443bb761a4118eca5faca980fd58aaa7d7a4c703a643bedfde8f6f502c9dc4cb0e4f61e1873bc445ac8f7b3c4978be6a4c8a2d68b1bbc615a2b171df721584b74a28c5bd0bac6aeff3", 0xcb}, {&(0x7f0000001340)="bb2b0890988f4dcf6201cb70ba19678f3b3619f0bfb89bdfe02b8a13aaa5778118f802bb164b21dd391f2c4204428ca944991706436e2020b7b8bd9849c91706906a2e338b9676ecc9b8c3bdd6cc0949186d8802b82c6ad48fbea99fb323120d9fdd7ff8a2703e28cc8d44eb54750ad1b8c6f40224d67724d185831b0c6ce9396a9e0fbb3e3f25492874c82aacb3d7a46ad64542bab108ec869a5025253e590fb9c46d68e5f7ca0278b989fa84fabdd9e31f706ce56ede04c8794bbbf3a2ab444263b87163cf2737806ff466a08544f93d9d0dc999d9dba647bfa0fabed31ad9885b5402bf827fb8a69f", 0xea}], 0x5, &(0x7f0000001480)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="540009a915b775d765540000a208020000000000fe800000000000000000000000f678d2ae800000000000000000000000000001000000000000000000000000000120010000000000000000000000000002"], 0x18c}, 0x804) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x2000c050) (async) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x24000000) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x24000000) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 0: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x24000000) (async) inotify_add_watch(r0, 0x0, 0x24000000) 16:06:56 executing program 0: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 0: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) inotify_add_watch(r1, 0x0, 0x65000a58) 16:06:56 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x4000) r1 = openat$zero(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x4000) (async) r1 = openat$zero(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5d0, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x62c) 16:06:56 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) (async) inotify_add_watch(r1, 0x0, 0x65000a58) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5d0, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x62c) 16:06:56 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x4000) r1 = openat$zero(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x4000) (async) openat$zero(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) (async) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5d0, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x62c) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, 0x0, 0x0) 16:06:56 executing program 0: pipe2$watch_queue(&(0x7f0000000ac0), 0x80) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) sendmmsg$sock(r0, &(0x7f0000000a40)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="09084331fc7a6a3587b432643b50499424506ba676879d7d74a0e2899c6422e1b06575da671cc9507f0b36cffa23aa097d53a85fa64a89", 0x37}, {&(0x7f00000000c0)="4dd49a8490e114cdcd15e7a5fe6ac7444fd38cbc2150f2d40d733346ab2770efd28b874f6288ef90b0d86fb177f5a86d10c1e35f03e461a85ccd3201955251d61cea80", 0x43}], 0x2, &(0x7f0000000180)=[@txtime={{0x14, 0x1, 0x3d, 0x16}}, @txtime={{0x14, 0x1, 0x3d, 0xfffffffffffffffd}}, @txtime={{0x14, 0x1, 0x3d, 0x4}}], 0x3c}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="a47c0373f660bee6b894408b3fbaba9e95824fd23e3d00ace1acd596d1f3628d16008762cb6d26b8c4a081410b9d6fc689513b0362a39134b5ef3538d1018c5b4fbcd6d4a31326a148bb278fec4bce9f605a6369ad7bd5a50910c5643c0c87d0f3070a221c7ef636d397bed9fee355d953e245e971f3a2ddb54c76a5da35a231f17659f974505c3842d24573e4a473155fe42739d1286d0f00a544399e898869c230a68321285c8721cde5caf4c0138a968f442a6305956c195f73ef5e8313e9086d927d446079", 0xc7}, {&(0x7f00000002c0)="6c45237661b5858166f5a20b", 0xc}], 0x2, &(0x7f0000000340)=[@txtime={{0x14, 0x1, 0x3d, 0x7f}}, @timestamping={{0x10, 0x1, 0x25, 0x40}}, @timestamping={{0x10, 0x1, 0x25, 0x2}}, @mark={{0x10, 0x1, 0x24, 0x2}}, @mark={{0x10, 0x1, 0x24, 0x3}}, @mark={{0x10, 0x1, 0x24, 0x21f3}}, @timestamping={{0x10, 0x1, 0x25, 0x40}}], 0x74}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000003c0)="25cc4c48586ef182dd748489504a42f0079c6dd7bdcd9d0f53e674f9aaec76ea792f63def1524abaedcaf1233c1cc6c9fb5b75bb5b1d8039ff60c9c824ed1ce794feb40a59e8a742e3853c0b5f19d7fd66f1a5ac54280d08169f8e6fc66096d615c493e7a6c92b9df3298f3973019542db0d67e76787e5870ec3c0c6431a2d89f9e37aefd7ffb003a5a5532af2ac75fd7971ee8cb28db4152ca003bf82bf0534508db4e0cc", 0xa5}, {&(0x7f0000000480)="c8b45c41915bbc0ffffaf85a1d96e585989a0f9eb04a5bee59940ac7", 0x1c}, {&(0x7f00000004c0)="e2c6d985c984cf82f4e2a0ea01970e1dcb1884bc2b4fcde8c59b8a2d7256da791cac564aeff7dfd1a7b95901f23f473380a06c26c8098613f4d36c0af3f2589373f18a7fc78d41c681514d3d3c1be4f641e46663143a29b9f468fd44dae77fb0fc1338471d55781e7880cc813afadcd38e2a16d83fb9994f9359744b48c6c3cc89c056b2f2c096a4023f8ec558865c5c9da3a16bf59fa0a516b821903b2fa3fa4b46174c6f1c9cf668", 0xa9}, {&(0x7f0000000580)="a9e82d2bf60a19e154d9f543a0df4ad3f138a38a482b9ff775b67953fe8b863fc9abadd45416cc469ce51a3b614947104ee715f6619102450cd047234140d75ea8e7d6f1899bbeea30d94f34bbf254d44c3d", 0x52}, {&(0x7f0000000600)="793a78c4eb27ef3623fcc5fb3e75661d332311c79bc942669856b54ae6be48eff38693bdd19407864e24f3f0a2fc5e9b4509de6bbcddaac667cce397828471968536d93f277c767277e755136184d5d7d46aa3a7d3fa", 0x56}, {&(0x7f0000000680)="b202c2bd82da984daa3f5795e2faf3a2cf1c4f59e181fec9af87c847b2a7a9152fbff4d3f6ec5fa025524a6c086e51d50818d04e7e930716b3d58085fb3ccacf8cd71ec778df3912272bbc3fe290acb225f94e08cdb24e32bb10f65b928670972c5544fc33e819c1fc3c1e70a0bf3efb55052e0eb9dc8aa9f4681b62d361e7fc3f9198b253efb7d953d7a6b6bd18a253eef46476f41e0d011f720c6c661d3806d3bf04711274e5b32bf75e316e910fc85a3c3bd423e98d193900bcdf18b1e9199dec9cfbef780cc2874d047311c7bbd786e368d89bd47490f745157cd7c957140304bfbf0f19264fa14b6fc679eda9c16027002d670a09", 0xf7}, {&(0x7f0000000780)="8a89836bd00682af71810a679cb05934277755ee698ae2b49ad1db4df21d09d68f247da7957dcf42732ad2fe2e54149f7fa8195961021621ff3b06768cccc6ee5bd180fc41bee0fb0a28e1f28591957a63c24b7d8d170cc8f303bdbac39f763c65e5f8d6f8a9f700e1cdb9c9c6867ad8666f790a063d19674f20d0c113309a3cf6b7c03319b3479dccf2db429de05be729b207d6a076c29818f50ef09259444877465bd3d0c3e32a2407714064254d8e8ea863cfe6af587da7329d097eff947fd154750f715a9c4b75df5f6c152d11aeb7363216", 0xd4}, {&(0x7f0000000880)="67974ad0438fd90924331faf731003e8d4ca7dcefd6577d503155d9f190a2f72aceb96b198b4e539d224bffb34dffe95ad6563adbe8343a959bfb279b98ecccc7eeee6e8289abfc121cff1b9bc86bf402d9b5919ca4179b0", 0x58}, {&(0x7f0000000900)}], 0x9, &(0x7f00000009c0)=[@timestamping={{0x10, 0x1, 0x25, 0xb1}}, @timestamping={{0x10, 0x1, 0x25, 0x7}}, @mark={{0x10, 0x1, 0x24, 0x1000}}, @mark={{0x10, 0x1, 0x24, 0x8}}, @mark={{0x10}}, @timestamping={{0x10, 0x1, 0x25, 0x1f}}, @timestamping={{0x10, 0x1, 0x25, 0x401}}], 0x70}}], 0x3, 0x40094) syz_open_dev$vcsa(&(0x7f0000000900), 0x8d82, 0x101000) r1 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x0) 16:06:56 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) (async) inotify_add_watch(r1, 0x0, 0x65000a58) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 0: pipe2$watch_queue(&(0x7f0000000ac0), 0x80) (async, rerun: 64) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) (rerun: 64) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) (async, rerun: 64) sendmmsg$sock(r0, &(0x7f0000000a40)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="09084331fc7a6a3587b432643b50499424506ba676879d7d74a0e2899c6422e1b06575da671cc9507f0b36cffa23aa097d53a85fa64a89", 0x37}, {&(0x7f00000000c0)="4dd49a8490e114cdcd15e7a5fe6ac7444fd38cbc2150f2d40d733346ab2770efd28b874f6288ef90b0d86fb177f5a86d10c1e35f03e461a85ccd3201955251d61cea80", 0x43}], 0x2, &(0x7f0000000180)=[@txtime={{0x14, 0x1, 0x3d, 0x16}}, @txtime={{0x14, 0x1, 0x3d, 0xfffffffffffffffd}}, @txtime={{0x14, 0x1, 0x3d, 0x4}}], 0x3c}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="a47c0373f660bee6b894408b3fbaba9e95824fd23e3d00ace1acd596d1f3628d16008762cb6d26b8c4a081410b9d6fc689513b0362a39134b5ef3538d1018c5b4fbcd6d4a31326a148bb278fec4bce9f605a6369ad7bd5a50910c5643c0c87d0f3070a221c7ef636d397bed9fee355d953e245e971f3a2ddb54c76a5da35a231f17659f974505c3842d24573e4a473155fe42739d1286d0f00a544399e898869c230a68321285c8721cde5caf4c0138a968f442a6305956c195f73ef5e8313e9086d927d446079", 0xc7}, {&(0x7f00000002c0)="6c45237661b5858166f5a20b", 0xc}], 0x2, &(0x7f0000000340)=[@txtime={{0x14, 0x1, 0x3d, 0x7f}}, @timestamping={{0x10, 0x1, 0x25, 0x40}}, @timestamping={{0x10, 0x1, 0x25, 0x2}}, @mark={{0x10, 0x1, 0x24, 0x2}}, @mark={{0x10, 0x1, 0x24, 0x3}}, @mark={{0x10, 0x1, 0x24, 0x21f3}}, @timestamping={{0x10, 0x1, 0x25, 0x40}}], 0x74}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000003c0)="25cc4c48586ef182dd748489504a42f0079c6dd7bdcd9d0f53e674f9aaec76ea792f63def1524abaedcaf1233c1cc6c9fb5b75bb5b1d8039ff60c9c824ed1ce794feb40a59e8a742e3853c0b5f19d7fd66f1a5ac54280d08169f8e6fc66096d615c493e7a6c92b9df3298f3973019542db0d67e76787e5870ec3c0c6431a2d89f9e37aefd7ffb003a5a5532af2ac75fd7971ee8cb28db4152ca003bf82bf0534508db4e0cc", 0xa5}, {&(0x7f0000000480)="c8b45c41915bbc0ffffaf85a1d96e585989a0f9eb04a5bee59940ac7", 0x1c}, {&(0x7f00000004c0)="e2c6d985c984cf82f4e2a0ea01970e1dcb1884bc2b4fcde8c59b8a2d7256da791cac564aeff7dfd1a7b95901f23f473380a06c26c8098613f4d36c0af3f2589373f18a7fc78d41c681514d3d3c1be4f641e46663143a29b9f468fd44dae77fb0fc1338471d55781e7880cc813afadcd38e2a16d83fb9994f9359744b48c6c3cc89c056b2f2c096a4023f8ec558865c5c9da3a16bf59fa0a516b821903b2fa3fa4b46174c6f1c9cf668", 0xa9}, {&(0x7f0000000580)="a9e82d2bf60a19e154d9f543a0df4ad3f138a38a482b9ff775b67953fe8b863fc9abadd45416cc469ce51a3b614947104ee715f6619102450cd047234140d75ea8e7d6f1899bbeea30d94f34bbf254d44c3d", 0x52}, {&(0x7f0000000600)="793a78c4eb27ef3623fcc5fb3e75661d332311c79bc942669856b54ae6be48eff38693bdd19407864e24f3f0a2fc5e9b4509de6bbcddaac667cce397828471968536d93f277c767277e755136184d5d7d46aa3a7d3fa", 0x56}, {&(0x7f0000000680)="b202c2bd82da984daa3f5795e2faf3a2cf1c4f59e181fec9af87c847b2a7a9152fbff4d3f6ec5fa025524a6c086e51d50818d04e7e930716b3d58085fb3ccacf8cd71ec778df3912272bbc3fe290acb225f94e08cdb24e32bb10f65b928670972c5544fc33e819c1fc3c1e70a0bf3efb55052e0eb9dc8aa9f4681b62d361e7fc3f9198b253efb7d953d7a6b6bd18a253eef46476f41e0d011f720c6c661d3806d3bf04711274e5b32bf75e316e910fc85a3c3bd423e98d193900bcdf18b1e9199dec9cfbef780cc2874d047311c7bbd786e368d89bd47490f745157cd7c957140304bfbf0f19264fa14b6fc679eda9c16027002d670a09", 0xf7}, {&(0x7f0000000780)="8a89836bd00682af71810a679cb05934277755ee698ae2b49ad1db4df21d09d68f247da7957dcf42732ad2fe2e54149f7fa8195961021621ff3b06768cccc6ee5bd180fc41bee0fb0a28e1f28591957a63c24b7d8d170cc8f303bdbac39f763c65e5f8d6f8a9f700e1cdb9c9c6867ad8666f790a063d19674f20d0c113309a3cf6b7c03319b3479dccf2db429de05be729b207d6a076c29818f50ef09259444877465bd3d0c3e32a2407714064254d8e8ea863cfe6af587da7329d097eff947fd154750f715a9c4b75df5f6c152d11aeb7363216", 0xd4}, {&(0x7f0000000880)="67974ad0438fd90924331faf731003e8d4ca7dcefd6577d503155d9f190a2f72aceb96b198b4e539d224bffb34dffe95ad6563adbe8343a959bfb279b98ecccc7eeee6e8289abfc121cff1b9bc86bf402d9b5919ca4179b0", 0x58}, {&(0x7f0000000900)}], 0x9, &(0x7f00000009c0)=[@timestamping={{0x10, 0x1, 0x25, 0xb1}}, @timestamping={{0x10, 0x1, 0x25, 0x7}}, @mark={{0x10, 0x1, 0x24, 0x1000}}, @mark={{0x10, 0x1, 0x24, 0x8}}, @mark={{0x10}}, @timestamping={{0x10, 0x1, 0x25, 0x1f}}, @timestamping={{0x10, 0x1, 0x25, 0x401}}], 0x70}}], 0x3, 0x40094) (rerun: 64) syz_open_dev$vcsa(&(0x7f0000000900), 0x8d82, 0x101000) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x0) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_init() r0 = openat$sr(0xffffff9c, &(0x7f0000000000), 0x44c041, 0x0) inotify_add_watch(r0, 0x0, 0x800000a5) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r4 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r3, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='sit0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080001000000be300000000420b0048006400000204907800000000ac141420440ced03ac1414bb000000004400f02000000009891fe77f000001ac1414aae0000002ac1414bbe0e1ff00e0000001ac1e010100"]}) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@delneigh={0x6c, 0x1d, 0x8, 0x70bd26, 0x25dfdbfb, {0xc, 0x0, 0x0, r3, 0x40, 0x1c, 0x8}, [@NDA_NH_ID={0x8, 0xd, 0x5}, @NDA_VNI={0x8, 0x7, 0x4}, @NDA_NH_ID={0x8, 0xd, 0x539}, @NDA_DST_MAC={0xa}, @NDA_FLAGS_EXT={0x8}, @NDA_LINK_NETNSID={0x8, 0xa, 0xc7}, @NDA_IFINDEX={0x8, 0x8, r5}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, @NDA_IFINDEX={0x8}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[], [0x4e22], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[], [], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_init() r0 = openat$sr(0xffffff9c, &(0x7f0000000000), 0x44c041, 0x0) inotify_add_watch(r0, 0x0, 0x800000a5) (async) inotify_add_watch(r0, 0x0, 0x800000a5) openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) (async) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r4 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r3, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='sit0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080001000000be300000000420b0048006400000204907800000000ac141420440ced03ac1414bb000000004400f02000000009891fe77f000001ac1414aae0000002ac1414bbe0e1ff00e0000001ac1e010100"]}) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@delneigh={0x6c, 0x1d, 0x8, 0x70bd26, 0x25dfdbfb, {0xc, 0x0, 0x0, r3, 0x40, 0x1c, 0x8}, [@NDA_NH_ID={0x8, 0xd, 0x5}, @NDA_VNI={0x8, 0x7, 0x4}, @NDA_NH_ID={0x8, 0xd, 0x539}, @NDA_DST_MAC={0xa}, @NDA_FLAGS_EXT={0x8}, @NDA_LINK_NETNSID={0x8, 0xa, 0xc7}, @NDA_IFINDEX={0x8, 0x8, r5}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, @NDA_IFINDEX={0x8}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x40) (async) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@delneigh={0x6c, 0x1d, 0x8, 0x70bd26, 0x25dfdbfb, {0xc, 0x0, 0x0, r3, 0x40, 0x1c, 0x8}, [@NDA_NH_ID={0x8, 0xd, 0x5}, @NDA_VNI={0x8, 0x7, 0x4}, @NDA_NH_ID={0x8, 0xd, 0x539}, @NDA_DST_MAC={0xa}, @NDA_FLAGS_EXT={0x8}, @NDA_LINK_NETNSID={0x8, 0xa, 0xc7}, @NDA_IFINDEX={0x8, 0x8, r5}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, @NDA_IFINDEX={0x8}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[], [], 0x0, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 0: pipe2$watch_queue(&(0x7f0000000ac0), 0x80) (async) pipe2$watch_queue(&(0x7f0000000ac0), 0x80) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) sendmmsg$sock(r0, &(0x7f0000000a40)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="09084331fc7a6a3587b432643b50499424506ba676879d7d74a0e2899c6422e1b06575da671cc9507f0b36cffa23aa097d53a85fa64a89", 0x37}, {&(0x7f00000000c0)="4dd49a8490e114cdcd15e7a5fe6ac7444fd38cbc2150f2d40d733346ab2770efd28b874f6288ef90b0d86fb177f5a86d10c1e35f03e461a85ccd3201955251d61cea80", 0x43}], 0x2, &(0x7f0000000180)=[@txtime={{0x14, 0x1, 0x3d, 0x16}}, @txtime={{0x14, 0x1, 0x3d, 0xfffffffffffffffd}}, @txtime={{0x14, 0x1, 0x3d, 0x4}}], 0x3c}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="a47c0373f660bee6b894408b3fbaba9e95824fd23e3d00ace1acd596d1f3628d16008762cb6d26b8c4a081410b9d6fc689513b0362a39134b5ef3538d1018c5b4fbcd6d4a31326a148bb278fec4bce9f605a6369ad7bd5a50910c5643c0c87d0f3070a221c7ef636d397bed9fee355d953e245e971f3a2ddb54c76a5da35a231f17659f974505c3842d24573e4a473155fe42739d1286d0f00a544399e898869c230a68321285c8721cde5caf4c0138a968f442a6305956c195f73ef5e8313e9086d927d446079", 0xc7}, {&(0x7f00000002c0)="6c45237661b5858166f5a20b", 0xc}], 0x2, &(0x7f0000000340)=[@txtime={{0x14, 0x1, 0x3d, 0x7f}}, @timestamping={{0x10, 0x1, 0x25, 0x40}}, @timestamping={{0x10, 0x1, 0x25, 0x2}}, @mark={{0x10, 0x1, 0x24, 0x2}}, @mark={{0x10, 0x1, 0x24, 0x3}}, @mark={{0x10, 0x1, 0x24, 0x21f3}}, @timestamping={{0x10, 0x1, 0x25, 0x40}}], 0x74}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000003c0)="25cc4c48586ef182dd748489504a42f0079c6dd7bdcd9d0f53e674f9aaec76ea792f63def1524abaedcaf1233c1cc6c9fb5b75bb5b1d8039ff60c9c824ed1ce794feb40a59e8a742e3853c0b5f19d7fd66f1a5ac54280d08169f8e6fc66096d615c493e7a6c92b9df3298f3973019542db0d67e76787e5870ec3c0c6431a2d89f9e37aefd7ffb003a5a5532af2ac75fd7971ee8cb28db4152ca003bf82bf0534508db4e0cc", 0xa5}, {&(0x7f0000000480)="c8b45c41915bbc0ffffaf85a1d96e585989a0f9eb04a5bee59940ac7", 0x1c}, {&(0x7f00000004c0)="e2c6d985c984cf82f4e2a0ea01970e1dcb1884bc2b4fcde8c59b8a2d7256da791cac564aeff7dfd1a7b95901f23f473380a06c26c8098613f4d36c0af3f2589373f18a7fc78d41c681514d3d3c1be4f641e46663143a29b9f468fd44dae77fb0fc1338471d55781e7880cc813afadcd38e2a16d83fb9994f9359744b48c6c3cc89c056b2f2c096a4023f8ec558865c5c9da3a16bf59fa0a516b821903b2fa3fa4b46174c6f1c9cf668", 0xa9}, {&(0x7f0000000580)="a9e82d2bf60a19e154d9f543a0df4ad3f138a38a482b9ff775b67953fe8b863fc9abadd45416cc469ce51a3b614947104ee715f6619102450cd047234140d75ea8e7d6f1899bbeea30d94f34bbf254d44c3d", 0x52}, {&(0x7f0000000600)="793a78c4eb27ef3623fcc5fb3e75661d332311c79bc942669856b54ae6be48eff38693bdd19407864e24f3f0a2fc5e9b4509de6bbcddaac667cce397828471968536d93f277c767277e755136184d5d7d46aa3a7d3fa", 0x56}, {&(0x7f0000000680)="b202c2bd82da984daa3f5795e2faf3a2cf1c4f59e181fec9af87c847b2a7a9152fbff4d3f6ec5fa025524a6c086e51d50818d04e7e930716b3d58085fb3ccacf8cd71ec778df3912272bbc3fe290acb225f94e08cdb24e32bb10f65b928670972c5544fc33e819c1fc3c1e70a0bf3efb55052e0eb9dc8aa9f4681b62d361e7fc3f9198b253efb7d953d7a6b6bd18a253eef46476f41e0d011f720c6c661d3806d3bf04711274e5b32bf75e316e910fc85a3c3bd423e98d193900bcdf18b1e9199dec9cfbef780cc2874d047311c7bbd786e368d89bd47490f745157cd7c957140304bfbf0f19264fa14b6fc679eda9c16027002d670a09", 0xf7}, {&(0x7f0000000780)="8a89836bd00682af71810a679cb05934277755ee698ae2b49ad1db4df21d09d68f247da7957dcf42732ad2fe2e54149f7fa8195961021621ff3b06768cccc6ee5bd180fc41bee0fb0a28e1f28591957a63c24b7d8d170cc8f303bdbac39f763c65e5f8d6f8a9f700e1cdb9c9c6867ad8666f790a063d19674f20d0c113309a3cf6b7c03319b3479dccf2db429de05be729b207d6a076c29818f50ef09259444877465bd3d0c3e32a2407714064254d8e8ea863cfe6af587da7329d097eff947fd154750f715a9c4b75df5f6c152d11aeb7363216", 0xd4}, {&(0x7f0000000880)="67974ad0438fd90924331faf731003e8d4ca7dcefd6577d503155d9f190a2f72aceb96b198b4e539d224bffb34dffe95ad6563adbe8343a959bfb279b98ecccc7eeee6e8289abfc121cff1b9bc86bf402d9b5919ca4179b0", 0x58}, {&(0x7f0000000900)}], 0x9, &(0x7f00000009c0)=[@timestamping={{0x10, 0x1, 0x25, 0xb1}}, @timestamping={{0x10, 0x1, 0x25, 0x7}}, @mark={{0x10, 0x1, 0x24, 0x1000}}, @mark={{0x10, 0x1, 0x24, 0x8}}, @mark={{0x10}}, @timestamping={{0x10, 0x1, 0x25, 0x1f}}, @timestamping={{0x10, 0x1, 0x25, 0x401}}], 0x70}}], 0x3, 0x40094) (async) sendmmsg$sock(r0, &(0x7f0000000a40)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="09084331fc7a6a3587b432643b50499424506ba676879d7d74a0e2899c6422e1b06575da671cc9507f0b36cffa23aa097d53a85fa64a89", 0x37}, {&(0x7f00000000c0)="4dd49a8490e114cdcd15e7a5fe6ac7444fd38cbc2150f2d40d733346ab2770efd28b874f6288ef90b0d86fb177f5a86d10c1e35f03e461a85ccd3201955251d61cea80", 0x43}], 0x2, &(0x7f0000000180)=[@txtime={{0x14, 0x1, 0x3d, 0x16}}, @txtime={{0x14, 0x1, 0x3d, 0xfffffffffffffffd}}, @txtime={{0x14, 0x1, 0x3d, 0x4}}], 0x3c}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000001c0)="a47c0373f660bee6b894408b3fbaba9e95824fd23e3d00ace1acd596d1f3628d16008762cb6d26b8c4a081410b9d6fc689513b0362a39134b5ef3538d1018c5b4fbcd6d4a31326a148bb278fec4bce9f605a6369ad7bd5a50910c5643c0c87d0f3070a221c7ef636d397bed9fee355d953e245e971f3a2ddb54c76a5da35a231f17659f974505c3842d24573e4a473155fe42739d1286d0f00a544399e898869c230a68321285c8721cde5caf4c0138a968f442a6305956c195f73ef5e8313e9086d927d446079", 0xc7}, {&(0x7f00000002c0)="6c45237661b5858166f5a20b", 0xc}], 0x2, &(0x7f0000000340)=[@txtime={{0x14, 0x1, 0x3d, 0x7f}}, @timestamping={{0x10, 0x1, 0x25, 0x40}}, @timestamping={{0x10, 0x1, 0x25, 0x2}}, @mark={{0x10, 0x1, 0x24, 0x2}}, @mark={{0x10, 0x1, 0x24, 0x3}}, @mark={{0x10, 0x1, 0x24, 0x21f3}}, @timestamping={{0x10, 0x1, 0x25, 0x40}}], 0x74}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000003c0)="25cc4c48586ef182dd748489504a42f0079c6dd7bdcd9d0f53e674f9aaec76ea792f63def1524abaedcaf1233c1cc6c9fb5b75bb5b1d8039ff60c9c824ed1ce794feb40a59e8a742e3853c0b5f19d7fd66f1a5ac54280d08169f8e6fc66096d615c493e7a6c92b9df3298f3973019542db0d67e76787e5870ec3c0c6431a2d89f9e37aefd7ffb003a5a5532af2ac75fd7971ee8cb28db4152ca003bf82bf0534508db4e0cc", 0xa5}, {&(0x7f0000000480)="c8b45c41915bbc0ffffaf85a1d96e585989a0f9eb04a5bee59940ac7", 0x1c}, {&(0x7f00000004c0)="e2c6d985c984cf82f4e2a0ea01970e1dcb1884bc2b4fcde8c59b8a2d7256da791cac564aeff7dfd1a7b95901f23f473380a06c26c8098613f4d36c0af3f2589373f18a7fc78d41c681514d3d3c1be4f641e46663143a29b9f468fd44dae77fb0fc1338471d55781e7880cc813afadcd38e2a16d83fb9994f9359744b48c6c3cc89c056b2f2c096a4023f8ec558865c5c9da3a16bf59fa0a516b821903b2fa3fa4b46174c6f1c9cf668", 0xa9}, {&(0x7f0000000580)="a9e82d2bf60a19e154d9f543a0df4ad3f138a38a482b9ff775b67953fe8b863fc9abadd45416cc469ce51a3b614947104ee715f6619102450cd047234140d75ea8e7d6f1899bbeea30d94f34bbf254d44c3d", 0x52}, {&(0x7f0000000600)="793a78c4eb27ef3623fcc5fb3e75661d332311c79bc942669856b54ae6be48eff38693bdd19407864e24f3f0a2fc5e9b4509de6bbcddaac667cce397828471968536d93f277c767277e755136184d5d7d46aa3a7d3fa", 0x56}, {&(0x7f0000000680)="b202c2bd82da984daa3f5795e2faf3a2cf1c4f59e181fec9af87c847b2a7a9152fbff4d3f6ec5fa025524a6c086e51d50818d04e7e930716b3d58085fb3ccacf8cd71ec778df3912272bbc3fe290acb225f94e08cdb24e32bb10f65b928670972c5544fc33e819c1fc3c1e70a0bf3efb55052e0eb9dc8aa9f4681b62d361e7fc3f9198b253efb7d953d7a6b6bd18a253eef46476f41e0d011f720c6c661d3806d3bf04711274e5b32bf75e316e910fc85a3c3bd423e98d193900bcdf18b1e9199dec9cfbef780cc2874d047311c7bbd786e368d89bd47490f745157cd7c957140304bfbf0f19264fa14b6fc679eda9c16027002d670a09", 0xf7}, {&(0x7f0000000780)="8a89836bd00682af71810a679cb05934277755ee698ae2b49ad1db4df21d09d68f247da7957dcf42732ad2fe2e54149f7fa8195961021621ff3b06768cccc6ee5bd180fc41bee0fb0a28e1f28591957a63c24b7d8d170cc8f303bdbac39f763c65e5f8d6f8a9f700e1cdb9c9c6867ad8666f790a063d19674f20d0c113309a3cf6b7c03319b3479dccf2db429de05be729b207d6a076c29818f50ef09259444877465bd3d0c3e32a2407714064254d8e8ea863cfe6af587da7329d097eff947fd154750f715a9c4b75df5f6c152d11aeb7363216", 0xd4}, {&(0x7f0000000880)="67974ad0438fd90924331faf731003e8d4ca7dcefd6577d503155d9f190a2f72aceb96b198b4e539d224bffb34dffe95ad6563adbe8343a959bfb279b98ecccc7eeee6e8289abfc121cff1b9bc86bf402d9b5919ca4179b0", 0x58}, {&(0x7f0000000900)}], 0x9, &(0x7f00000009c0)=[@timestamping={{0x10, 0x1, 0x25, 0xb1}}, @timestamping={{0x10, 0x1, 0x25, 0x7}}, @mark={{0x10, 0x1, 0x24, 0x1000}}, @mark={{0x10, 0x1, 0x24, 0x8}}, @mark={{0x10}}, @timestamping={{0x10, 0x1, 0x25, 0x1f}}, @timestamping={{0x10, 0x1, 0x25, 0x401}}], 0x70}}], 0x3, 0x40094) syz_open_dev$vcsa(&(0x7f0000000900), 0x8d82, 0x101000) r1 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x0) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[], [], 0x0, 0x0, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_init() (async) r0 = openat$sr(0xffffff9c, &(0x7f0000000000), 0x44c041, 0x0) inotify_add_watch(r0, 0x0, 0x800000a5) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) (async) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 32) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async) r4 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r3, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='sit0\x00'/16, @ANYRES32=0x0, @ANYBLOB="0080001000000be300000000420b0048006400000204907800000000ac141420440ced03ac1414bb000000004400f02000000009891fe77f000001ac1414aae0000002ac1414bbe0e1ff00e0000001ac1e010100"]}) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@delneigh={0x6c, 0x1d, 0x8, 0x70bd26, 0x25dfdbfb, {0xc, 0x0, 0x0, r3, 0x40, 0x1c, 0x8}, [@NDA_NH_ID={0x8, 0xd, 0x5}, @NDA_VNI={0x8, 0x7, 0x4}, @NDA_NH_ID={0x8, 0xd, 0x539}, @NDA_DST_MAC={0xa}, @NDA_FLAGS_EXT={0x8}, @NDA_LINK_NETNSID={0x8, 0xa, 0xc7}, @NDA_IFINDEX={0x8, 0x8, r5}, @NDA_DST_MAC={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, @NDA_IFINDEX={0x8}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x40) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) r4 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x400, 0x0) ioctl$CDROMPLAYTRKIND(r4, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000480)={0x0, r3, r2, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) ioctl$DRM_IOCTL_MODE_CURSOR(r1, 0xc01c64a3, &(0x7f0000000000)={0x0, r3, 0x8, 0x8000, 0x401, 0x415e, 0x6}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5d8, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@tcp={{0x2c}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x634) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5d8, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@tcp={{0x2c}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x634) 16:06:56 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) r4 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x400, 0x0) ioctl$CDROMPLAYTRKIND(r4, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000480)={0x0, r3, r2, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) ioctl$DRM_IOCTL_MODE_CURSOR(r1, 0xc01c64a3, &(0x7f0000000000)={0x0, r3, 0x8, 0x8000, 0x401, 0x415e, 0x6}) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: sysfs$3(0x3) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x480) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5d8, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@tcp={{0x2c}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x634) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) (async) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) r4 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x400, 0x0) ioctl$CDROMPLAYTRKIND(r4, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) ioctl$DRM_IOCTL_MODE_SETPLANE(r4, 0xc03064b7, &(0x7f0000000480)={0x0, r3, r2, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) ioctl$DRM_IOCTL_MODE_CURSOR(r1, 0xc01c64a3, &(0x7f0000000000)={0x0, r3, 0x8, 0x8000, 0x401, 0x415e, 0x6}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 16:06:56 executing program 1: sysfs$3(0x3) (async, rerun: 64) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (rerun: 64) inotify_add_watch(r0, 0x0, 0x480) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x0, 0x9}}, @common=@inet=@tcp={{0x2c}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}}, @common=@inet=@tcp={{0x2c}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: sysfs$3(0x3) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x480) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:06:56 executing program 0: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x2002, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x1, 0x0, 0x1, 0x3}) r1 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r1, 0xc0487c04, &(0x7f00000007c0)={0x0, 0x5, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}, {}], 0x3, 0x0, &(0x7f00000006c0)=[{}, {}, {}], 0x3, 0x0, &(0x7f0000000740)=[{}, {}, {}]}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x0) openat$zero(0xffffff9c, &(0x7f0000000080), 0x303040, 0x0) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}}, @common=@inet=@tcp={{0x2c}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 0: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x2002, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x1, 0x0, 0x1, 0x3}) r1 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r1, 0xc0487c04, &(0x7f00000007c0)={0x0, 0x5, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}, {}], 0x3, 0x0, &(0x7f00000006c0)=[{}, {}, {}], 0x3, 0x0, &(0x7f0000000740)=[{}, {}, {}]}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x0) (async) openat$zero(0xffffff9c, &(0x7f0000000080), 0x303040, 0x0) 16:06:56 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) inotify_add_watch(r0, 0x0, 0x400) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0x0, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}}, @common=@inet=@tcp={{0x2c}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x0, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) inotify_add_watch(r0, 0x0, 0x400) 16:06:56 executing program 0: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000000), 0x2002, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0], &(0x7f0000000080), &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x1, 0x0, 0x1, 0x3}) (async, rerun: 64) r1 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) (rerun: 64) ioctl$MEDIA_IOC_G_TOPOLOGY(r1, 0xc0487c04, &(0x7f00000007c0)={0x0, 0x5, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}, {}], 0x3, 0x0, &(0x7f00000006c0)=[{}, {}, {}], 0x3, 0x0, &(0x7f0000000740)=[{}, {}, {}]}) (async, rerun: 32) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x0) (async, rerun: 32) openat$zero(0xffffff9c, &(0x7f0000000080), 0x303040, 0x0) 16:06:56 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}}, @common=@inet=@tcp={{0x2c}}]}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0x0, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x45) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) r2 = openat$drirender128(0xffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) r5 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x400, 0x0) ioctl$CDROMPLAYTRKIND(r5, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000480)={0x0, r4, r3, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) r8 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x400, 0x0) ioctl$CDROMPLAYTRKIND(r8, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) ioctl$DRM_IOCTL_MODE_SETPLANE(r8, 0xc03064b7, &(0x7f0000000480)={0x0, r7, r6, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f00000001c0)={0x0, r4, r6, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0]}) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x800) 16:06:56 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) inotify_add_watch(r0, 0x0, 0x400) 16:06:56 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) inotify_add_watch(r0, 0x0, 0x80) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x15) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0x0, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 0: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) (async) r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x45) openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) r2 = openat$drirender128(0xffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) r5 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x400, 0x0) ioctl$CDROMPLAYTRKIND(r5, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000480)={0x0, r4, r3, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) (async) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000480)={0x0, r4, r3, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) r8 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x400, 0x0) ioctl$CDROMPLAYTRKIND(r8, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) (async) ioctl$CDROMPLAYTRKIND(r8, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) ioctl$DRM_IOCTL_MODE_SETPLANE(r8, 0xc03064b7, &(0x7f0000000480)={0x0, r7, r6, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f00000001c0)={0x0, r4, r6, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0]}) (async) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f00000001c0)={0x0, r4, r6, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0]}) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x800) 16:06:56 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) inotify_add_watch(r0, 0x0, 0x80) openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) (async) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x15) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0x0, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) inotify_add_watch(r0, 0x0, 0x80) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x15) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) (async) inotify_add_watch(r0, 0x0, 0x80) (async) openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) (async) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x15) (async) 16:06:56 executing program 0: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) (async) r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x45) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x45) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) (async) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) (async) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) r2 = openat$drirender128(0xffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) r5 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x400, 0x0) ioctl$CDROMPLAYTRKIND(r5, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) ioctl$DRM_IOCTL_MODE_SETPLANE(r5, 0xc03064b7, &(0x7f0000000480)={0x0, r4, r3, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) r8 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x400, 0x0) ioctl$CDROMPLAYTRKIND(r8, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) ioctl$DRM_IOCTL_MODE_SETPLANE(r8, 0xc03064b7, &(0x7f0000000480)={0x0, r7, r6, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f00000001c0)={0x0, r4, r6, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0]}) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x800) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0x0, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0x0, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x80) 16:06:56 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={0xffffffffffffffff, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r8 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r8, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r8, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r10 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r10, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r9, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) r13 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r13, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r13, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r13, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r15 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r15, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r14, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa40204}, 0xc, &(0x7f0000000b80)={&(0x7f0000000400)={0x774, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0x9, 0x0, 0x5}, {0xe5, 0xff, 0x2, 0x5}, {0x1f, 0xff, 0x81, 0x20}, {0x4, 0x3f, 0x7, 0xfec}, {0x0, 0x6, 0xfd, 0xffff}, {0x3f, 0x9, 0x4, 0x2}, {0xbc7, 0x2, 0x7f, 0x9}, {0x5, 0x5, 0x3, 0x21}, {0x5e2, 0x80, 0x3, 0x7}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x77a}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xffffff81}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xc0fa}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7d0}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0xbc, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x88}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffeff}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x73}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x158, 0x2, 0x0, 0x1, [{0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0xffff, 0xc0, 0x8, 0x2b8}, {0x0, 0x8, 0x0, 0x1}, {0x2406, 0x7f, 0x2, 0x1}, {0xed, 0x81, 0x8, 0x9dd}, {0x8, 0x7, 0x23, 0x1000}, {0x6, 0xe0, 0x6, 0x8}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xca}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}]}}, {{0x8, 0x1, r11}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xd04c}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r14}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}]}, 0x774}, 0x1, 0x0, 0x0, 0x8000}, 0x40810) 16:06:56 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x80) 16:06:56 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0x0, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:56 executing program 1: inotify_add_watch(0xffffffffffffffff, 0x0, 0x80) 16:06:56 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0x0, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000000a80), 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r4 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r3, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r5 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r5, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r7 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r7, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r6, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0xc0be90d52b0cd31b, 0x70bd28, 0x25dfdbfc, {}, [@HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0xd4}}, 0xc000) syz_genetlink_get_family_id$ethtool(&(0x7f0000001040), r0) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) 16:06:57 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={0xffffffffffffffff, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async, rerun: 64) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) r8 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r8, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r8, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async, rerun: 64) r10 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r10, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r9, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) (async) r13 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r13, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r13, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r13, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r15 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r15, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r14, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa40204}, 0xc, &(0x7f0000000b80)={&(0x7f0000000400)={0x774, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0x9, 0x0, 0x5}, {0xe5, 0xff, 0x2, 0x5}, {0x1f, 0xff, 0x81, 0x20}, {0x4, 0x3f, 0x7, 0xfec}, {0x0, 0x6, 0xfd, 0xffff}, {0x3f, 0x9, 0x4, 0x2}, {0xbc7, 0x2, 0x7f, 0x9}, {0x5, 0x5, 0x3, 0x21}, {0x5e2, 0x80, 0x3, 0x7}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x77a}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xffffff81}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xc0fa}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7d0}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0xbc, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x88}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffeff}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x73}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x158, 0x2, 0x0, 0x1, [{0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0xffff, 0xc0, 0x8, 0x2b8}, {0x0, 0x8, 0x0, 0x1}, {0x2406, 0x7f, 0x2, 0x1}, {0xed, 0x81, 0x8, 0x9dd}, {0x8, 0x7, 0x23, 0x1000}, {0x6, 0xe0, 0x6, 0x8}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xca}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}]}}, {{0x8, 0x1, r11}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xd04c}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r14}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}]}, 0x774}, 0x1, 0x0, 0x0, 0x8000}, 0x40810) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0x0, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000000a80), 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) (async) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r4 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r3, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r3, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r5 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r5, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r7 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r7, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r6, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0xc0be90d52b0cd31b, 0x70bd28, 0x25dfdbfc, {}, [@HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0xd4}}, 0xc000) syz_genetlink_get_family_id$ethtool(&(0x7f0000001040), r0) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000001040), r0) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) 16:06:57 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={0xffffffffffffffff, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r8 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r8, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r8, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r8, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r10 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r10, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r9, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) r13 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r13, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r13, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r13, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r15 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r15, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r14, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa40204}, 0xc, &(0x7f0000000b80)={&(0x7f0000000400)={0x774, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x7c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4c, 0x4, [{0x9, 0x0, 0x5}, {0xe5, 0xff, 0x2, 0x5}, {0x1f, 0xff, 0x81, 0x20}, {0x4, 0x3f, 0x7, 0xfec}, {0x0, 0x6, 0xfd, 0xffff}, {0x3f, 0x9, 0x4, 0x2}, {0xbc7, 0x2, 0x7f, 0x9}, {0x5, 0x5, 0x3, 0x21}, {0x5e2, 0x80, 0x3, 0x7}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x77a}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xffffff81}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xc0fa}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7d0}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0xbc, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x88}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffeff}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x73}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x158, 0x2, 0x0, 0x1, [{0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0xffff, 0xc0, 0x8, 0x2b8}, {0x0, 0x8, 0x0, 0x1}, {0x2406, 0x7f, 0x2, 0x1}, {0xed, 0x81, 0x8, 0x9dd}, {0x8, 0x7, 0x23, 0x1000}, {0x6, 0xe0, 0x6, 0x8}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xca}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}]}}, {{0x8, 0x1, r11}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xd04c}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r14}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}]}, 0x774}, 0x1, 0x0, 0x0, 0x8000}, 0x40810) 16:06:57 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000000a80), 0x0, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) (async) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r4 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r3, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) r5 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r5, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r7 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r7, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r6, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xd4, r1, 0xc0be90d52b0cd31b, 0x70bd28, 0x25dfdbfc, {}, [@HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0xd4}}, 0xc000) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000001040), r0) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0x0, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x80) sendmmsg$sock(r0, &(0x7f00000007c0)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)="a4ed52546e41eff58c770f661ab5b05746ee095ebd2ea674ad89e53dfe914159d08ea37b6dd12db50b81d1d6be8039727568b2e6f1abdd1fd2fa8f31d21c2540d647d270c2a084c89c39ca4948f40c027ea4d60bcedfce9c3efde4a43baac1ad0b9164a67f69a49964fe94c47bbc1d42acb4fbda8ea0b180cb529820a54184e2c0b1a2ace63651a6637135b70a4e5754806c167abca8a29e2bacc9a80fa0a041026f90a356b9b1f4cabdd654121974a7fb4ffe1ad81e1d3010f0340cd835029b5d6323f8e268195e38f73c8cfd22b591", 0xd0}, {&(0x7f0000000f00)="a5fe354380c7745440030c9a1fdffe304a62d8c838de0f33e77d14dfbbab9450f1ef74eb34c2da743ec7edde830a63a981b32c9c75325c88da8d5d1327c2efcdf9787aad3779be444e9c6ff78b014b16c8e8b02cdb95ac9716d67aad69bfa1bc80401bb207d8630a26dc36db11cfa24b8d023a95a8088c0d7e3899650ad10ea1cb61bcd7088f53aa8a559a3ad841f1bff16845b43de32c166b3c53a5078f3807608228f2097d5915a4c7d8ab89c7db45c9cb505de231d778a0f93a763cdfd18a9beacde192221dab2f9b12a8265dc064665ef19a1a2d86c4acf68b20c9f02540014269b7a800b9734df5fae6f57b69494adfbeb9c7298c17bb47c60ceba154628a6b2670c7c5a45aad7ba75fd7b3ef2608d3f23cd66380259cb746b25c884facddb38520e1a7d4576211184324a4c08379c99c59a2bcd853e48dd5d921fe733fc288060b387748056d06fb91711c33a70348e251c56bc135b1fab6b9610b302ef9dbb6084e4640381f1053f25e7f6a462cc68bb6968cedc7956ce75437e7a52e11ad74c2f016b3023a4a2c6909f82462100d50b2637f9ebac43f06f181c74b4f7c200eb961c7c96a14fc7dad769532b47431b0defd8b4e30d324014b20f27ac23775a96f30dcc1084bbd1f7b4c83b1414d3c6f957dcced66f424a81427cb33cc32462d8ed918122aff57b8392b5b54cbc06be6031ba6947eee09123c93aa7644d7ea913f8519c2adbdfdcca9cc9c440149c0bcccd439fb5b64fcd2fbe043ca69e3b1769068832d29343d5888b5cc18f203966579ea9e7e286a7b85bf3f74a2db5b98e6cc6a92f0e52b1a90703784216c222ba1654330b4d5028fbb8d1f2621d9a6388b63193ac00239bd94d6995f3c7b90d1a3eee65e7927b634ef0e9df2d05c36a0b1c07970012b8f824a6b5f9b9127e23e49eaf44d9f8d8f975d532bf8c51ddb8abb872c22c4ed56333791f3cdde13372d4cea4f0e5fdf408faae76c1752b2f590e3b7b76095750c0a00121ac23e08c4710a5178bdea4041e4222a4c5b257da20a137724d07677bc8e5f8055188a253477fa6b72062f7d6652fcbfc96462b44ee95df08075bc3945c7b49c036eef3f0f274773715c9263a6f87308899e27e0eb16a14feff1e42bf776a4f859a0a730c8d54b90beee47d920c05d2178da0d1a356d4e0d79a412cb1d64617b3aa9bdecbb1a52adf6f6aaac2cf2277b128ce7abd7489c692ae78b6150a9ef92410e4d2aac997562c7995f5dba7f70f15ee90c192f15f28596bbb6dc39ce7814b35e754a25d3fa537d51c3e6b9645c6c69d2da53afe94982623c520c938b28ce705fa0c866bedc81f3ed5775e70ded989d23fbd8efee359b3090477ff093820866d65e7e7981467a44a5282be1f45e38fabff150b53933fb682bbf248a6d4e2c2270be358bf2bc77f6c38b3bb7c280e148a167074543315b333b70447ae4ff7354fb18d7e5ffc85a7ccfa58f5e4612d58f7e3126b5b997784f3265dd20c673c08c3adf741c5aac1e1bdc58d94f9f8bcbc48d6cda77f66325a9d1194730d8fa897dcca6cd851c706ab40e2200d530a0f525b1ed95d64c5ad7c6b8a367a9f89bf317568d306b931571a22643f05e22a5cfd60b7831db222adde5f4c2949a120825bd77dc10b0948fdd2314e32057bf8eb789553ad1e20ba064e66e36ef0049d594f18b3efd7f504e8cb21612559c4f1847f592384701f121f5bbb4f090337ce386f8d99f8ca992dd1cf9aab7fdb3e0a220fb3733951f2a41c0ea45d0b8ae2c60bed38be7d38efe24284907b94fbbe7c17a25e88e99c0467ae899bbb0e26eee5473ae26b49f34922d8169931ab0d324cc6c8aa7ae0e67c9b77fbb1145b29a5e592c98cd86f598c00a0f353973a6c243f0bf1cb2b8827e30d2d0ef92541567af20e1e34eb2a1517161d52bd84f80992d97c3eddf81f5b7e20df1df704868c78acca46314f1fdbc1ebfcb34591b4a601d0124923f3679470de2046287513a67021bff707e3c410626b3e8cc2dcde254f83480ffcb92117dfea2098235e00184b93ac8604742f5eb34b8965b901a63e127c5e721d83615451bb979733e7862ff8be2595643bce5e07754e98f1b11aa10a36d427005f3cea29c1873d7af86f1cb2bf5557e708158681a7ebf11ae2b8a1c0b98c990aedf96bcd78086659b144ddae3b631d9c6b1f5579dc76ed6f13097f05c87f297a9fea48e6a2d5e11b0120b44552d3342e926278fae43fb24e43d26a7f99654ec891d3b2eccbc723bf45dfd14106f1330dae843753ba8c9937bcd0cd7e89068824b56f8e483cd95109c1cca6599a0ecbe06b766f47f3d89c18500a6afd9605b22943ba6b653960ffe99373b10d3de8e5f71b353d4f32bfee1bb60a1daf2cedf8cdd58b338694c5cbae674febb4e82b14da699172eed685618a536b53125ae5f794edc1941450b7f4efef8c45b7c1bdc3dae09a2a95a8c5c9fb72ed685a45bb964cf7497080a543add52afacbd19c82bba4c15a363327a3b88bad0deb059e27eabb9426363087f642d489d2cd3f1a08954cfab5ee60a64339c77f1b09df22bacc4120db3e779938322c7826414d4e37fcc3636a8376b862708c9adc5ebe675286a767e4652d06e2e41f59cec5207b76adfd35cac3a52f4057af44419e5d68b95fbbf74a889f0244184445d3cfa2c5b3e8f37ea8b8a110437282b4defef31052b946d141f2facfef99b06389a040906f829a88ad366c163cc497140f97e0093fa4017f43284a6c41b9035d0c850fad3b12e3f7eaa25993e78340a660e2b52116f91ce9b50fa3bdf48c7600efe40fec912736b4b983701113fd86a4858e15da1ad1c742850af8c5fefe3f0f195d9a0a4cb37a1107abebcf32167ab3504a4f29ac8f74c5e92a2053bfc7168bc5598ea2243c6edae2d981c9edaf548ab7f5498d9c1628be5f17aa083d87114d9f03c804c81ef80f7ed2a3b62229e3471930782165385bf05d8454fdf5ed78fba79f0e13cf499eccee660d18f80dd6c7fb9f7ebd14718bf6a1884bad959a18e421efd9b07645badb5cb46515efa32b4db4d98811ef2e88edb78f5b86f16e83a3691441c644814ba95a3cd73a723ddd82cdf939b5df38246e4b99f23349ec1a66f540aee13c4d4285b696d2c6f58965d41a8b0e06355fc8537622ef22e4e1450d4cba8cc3fd076493590cf38c5a0cdc706bdd8a05aeca7ae1102ecce1110d910a6582bc0eb001fcfc8fc44da8b40aa4491cc87a78031a8905449e30a18ad07dca9f05226a3e76e90648c800a5b54a2a81eee7a47499c91a206f073a49cedd9ed0c07fb6f7517706c2d8e4c06fd238fa0eb5f959739b151631700f87e753f744ee02facd0add19f9a63680abf8a6719a76e6ad3d35fe7addb5032eedf35bdc87a9953ab97752517c41e5123e8ee75d1923fdf112847cb7769609c45d9d481c1b518ef217b01eb291f3712e47cdf78df96002278b945cfbe9301e7743ba1e8197ac47fe74a063dc7def21e0b9328ae9305bf542a95830f8448d1e559916df39cf3993cd50c1ff38de710c2733229577a6240c4fdadf7d33d8b68653cce3160a606620bc7de998394328178c44f9b5a8219092459bfba2b1813014ca209f51b767b0ce2c75b58af70273b7ae222834db86debd543649635b60ae05ec85f5223b4b0a65eec4459bc07dd3b3ef285e475572146ee649c1d918b98bddc1babf5e1138135c4003963715262ded6bceba0ddeba95285214699a41efd2c056d46bbfccfd5fd0654f51725d55c09e84e8dba2a0574faedec8459d7b0fcb598f1a6c1608aab827c5f5eaa374c6e568ad7a7fb73b63348207138cf86ab2ef77c61c3dab7089a0ff103b4aedfbb8d7961b804bc7e559834bc6ab8921ffd31f776d8e4edc93dd524bcf032fadfbc39141736b88ca0a7784132bef4fe0882685f067be3491191b1f385e161f60c8dd32f35d8e3f20f38d3e6f6a724d21bc978eb219bf8ee5c00f26e13136d838f54737d6e7811618b79b824bdc22bb05535a889696c1171989e8c3993a182350d7eec9aaf968d0020eabb6e7eff4631016b19e0280d0396bd85fd7a71ae509d3d61539401b7a6eca025a54dbd6b806a0c02a7abc2e0d599a7ba949aa5abc52e0834828aad10c99a5da4edc3784d9e91a8c8dc4d7d8dea7b9318127cf55d619bc944de8b029eefca5000760a1714990ffb9b636f4f084de770c29663f4f11f096e210e96023cec2af35e7604e2c4639c5bbb0cbf6841eec184f9efecdf53dfdea9e31b821a5fc75abe5b7db535e538fe71481cd559f00b3a4e55c06863adbfdf2827b97a43835a5c29a792d36b3f2631b59f8fbaa4717acc0b89fd52cd40ad6299fabc97f7b5c3a78261c04699a9977c07d82558d700e604fe7f12f4f9c9e21e3d3c456bfd9c9669ebfadf51364199557398e751d67ec8eea6274dc7355c98c9c533ed91a477a85d19d68e22d430697cb550629f360badc2621c32871518c430db333d218de464225115a569dd0941fbe41215e1530d63ec4f0e4a4cafbca75a9986031a3f03715fd2b55e00e1927bf3276101baa6ad94d0ddd2363a0a51770a625d79392b3aa92bd219141b853a8ac4276c4e140448f8e8fac85b7d59d8db8971b8c5f40df6fb19c7f9f3ddd864adb78ea599b374c12027e56adef915938f6f4be09fa6ac01eb7ef0829de1da9b7c468a561e36dc075d1165c3b783d720ed06ed4219f073a92df922a4beb9bd85d3cc5fcbf13370dba28ce457857d37cca3773940ec3c8f908c87ac77c144b2edc8eaa0a69b4ce6e0e6a8fb9ced64329837a6e346c81d2aba70d727790d436f5a2fb4933e1f0e2d9c66045e0b45a23641b4f8d029ced118476d393b1a41ef4a40c9196583bca78e9f56fcc1de4e390b5f3e4f7ad0acc578e10d83d70b7cc84bf6eda9c6b2662b27429a2ee4d02fd0af3130b8547af503724d9a35f5831ff4a58abc830c09083b1a00d450e566b3bac74b6892f9aaf6fb24cee3568de78cd4cbf76a84514d054282f8718f32d975e93b39ff76fb6d319b52638b71285b74f50daea38b0bae4feeaffae85b4187e592d2faa5eb6799ed2172c8315170dbc89a483bbc49c1f9018132626bb2f312909d0d9c637db07a4d0c93373661e8620dbb6370ca14bf5615462d9acadadc6ddf24f272cdf0125a21dfcf403d0f508d7059a358c9ed4572016c8ea4877b6124ccda841dbcc8ae4fd516c3f143e8661f52de4bcebebbd0f682a5d1fe4c6bb94e0f3ab92c5f0755abeeb944250842f6a02f857aa4b4b1e76122834340cfb3aa25d3b125e4c0b3ddb4440aa3d0a0b30573f3030118ade609b71a2c0e1f0ffc51280b350c6abb98b74a2b96207f2325668bd090c309464da50f8b490887bb3364d7343c917352030a55684446f358444490da567cb62d26d7fc28d849e63369435f967e4784b805e984e87a295825bb7555a36bcc5dbfcd58b5aef2696ab12c1acc59227224c52d0186ee0f782e7b32abe7ef6801ba54f2234a2ec1ceb35f1ccbc65b224ff3e015f45ffcc2471919bb5c7a4ebac06fb958473190fde62d52a2d208104879905eb62f5f637415bc9ea91f1fde896058ea1b93a08345f2667e2840ec9d89aaef45f7fbbd3312355e85f9e27a93c1288117ffadf1f7d49a2ace03dee304611db24a98f8b07e4c3db418f62db869430b559853f2fcc271a70ad4ffbe4b162945b5117e0fd78933747b594a1792175575d683201c73f2ba36767be504b5c4dbf00258c01e51d4032b150b933fe0a07f327f1c19b670819087", 0x1000}, {&(0x7f0000000180)="1574618a87ac6f82a1cd009a25e31b29ed63533c090408c50ff2c0037bfda90a21290f6ab635f0b8784eb1d3c04dc03e13a6a0241adda9177b06c970", 0x3c}], 0x3, &(0x7f0000000200)=[@mark={{0x10}}, @timestamping={{0x10, 0x1, 0x25, 0x2}}], 0x20}}, {{&(0x7f0000000240)=@l2tp={0x2, 0x0, @private=0xa010100, 0x1}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000002c0)="42420d21b4655b21f2355203c6187fc37e9ba2598435d920af30e196d7806f91bbb0bcec26c4d59b96e1ad167d28c8668a4da700f97504054e110360ad00396266c29e8534f672295acfd1c715d8391e914f3ca8bae79f900af9", 0x5a}, {&(0x7f0000000340)="c430791bfa93ed61c81d47a3c8128662ebf23b1e102962f70371e274927d5a31c0e7129826cdd082d4ddd9cb0a2d36df3fb87186333a3e80a4b4402140d51844fac9b6b81392c663f332facdfa7b2560279328b0087763a235927839bcf90eba34e06d51f89860a6c49cbf103a89e0829f231095f2bad374fc8395c70398b95a7c81241647e331986ce0b36ce34a10635f2d023ee6774de0cf28084c882c2f6659c368e70ebe04ed89f8686fadbf7805e2ebeab0e6adda7f7333b3d6a027bc6d7744998fd8bd147d4963daa69e4059c453b31a78ab18bea77ab7f8e5c4a37bcadc45932ce66ff6f3da8bf8644bd44b79c6", 0xf1}, {&(0x7f0000000440)="b57c5ef5ed4eb95bebccb7f5687b0c26a198b638199dcfef6d6e32c98f6e5099fa83f4454be4b1e8270e04ede0143227bb9ad3513dfb6d9fa7a5b3b9b7b9ca8c2be8f6529ad48bcac3dfc861ad4397558b9557f1cb3cadf0a08d12cc5cf1f66e21569d1bfc4625f6906c222f35275273c632bd18b4b3a250c2ef6d8a137ff800694e0d3729e5b83302f4bf57fe8428c55aceaad6ccbda1e79c07c4cf660fc005b7c716b0b5859724ee73d2f0869c4276a070fefa4f51cad54c2251138282b0cb3b4ac808f64e075a2fb13a76afed0d14c050630f6f2cab028873e8092d", 0xdd}, {&(0x7f0000000540)="30fcd7f12660dfe1700e47428201bf3b4ad5babfd8c9174ccb44c8d5ef64bcd3e94e40e972c5503db3f7917bee21fed8ead731c4510e41eeadee92d0742bf9a7", 0x40}, {&(0x7f0000000580)="ec11394d00d10345b339212a0056e7a9b81ae67a93963d8b2db5479e80", 0x1d}, {&(0x7f0000001f00)="495542497ea30852b3f219208d2bb11dedc4c42f5b9b8bf5a19accd4e79233503e915c47a60dad7ed7fdd60cf1020fb7663944eaee0917cf0e217045639c282ac08a962835ce1d212e7126181fce3ad0e21502b1c36139d4ff0f6f0b5cff994e4f8b0cdfe2bcb44bbe981dc8d3977e2b09e3af5392a013d3fa84ae4d4bee0313348dc88b86cf5bdc86f3f0d3a9639bf08ca5b65f41e31034da99bf83ffce94c4609304f4af9b41ce658b52cca023629544d2dacdc22c8072a7708440a5b397b68ae7e1169f78faab2299574cca92ed3cc9e1da35fdfc2bfd7366d9d1e486c456a4f804e5e116695b0a150ebbd165dd79664fece0eb402ac89866539ad518148e237012cc3f3611076872497484efc5af6ed44ea79452ef82186f88f7d60989a70b3c7e1f1a2753815e1ca7f27680486b69dc604cb5143f770d454d6f0774f654034aeb2c11fc0e04b022549701fd707a67bcf736d0da81d7d8e73bb24407c58c6bb7a1cd74a32a9a8142a7c496f1578a1a8c38fd7f6fce81a8af8f8bea2a3599275009a6e3fec3430821d621137dab1cc7e730194e763ce5f006ebf13df771d21a725de96136a367325fc284ddcd796b911d34eb90b65f1135754b57846739134aca6affbb36fe71f844b3fbe015b29206dcb1b763c2ca0d2ea44a2387155af53218e83565af37a1ac6073ed9235ead4c5d0a3076d55ff7389c06d4eecce3ccf9fc72ecd51fa886d4b9a258fe4aad3d367ed885f9783ffe7f7cd2f1d5dd330ae2234248b5a8ce46a703a6d61e1ad3a4ef8197d6ccd08ba24f68a164ebb719d347da32a601db95af3b02f6f4ec5ee1eae6feac47ec24e883bbaf7c0d465bd92bacfaa0576dad82c34c9f208c9ddf625b2512fe6fc690099cb354d178e56c941951b76d4df0a2ceda67e7ebc808ef9e29bd36c3af7b0facdd16579663abe3ca86ca65e1066e76c986a57161e0abf77c854e81c23214b9b0aa277a26a1e83761cc8f69efc17a745021ea9523d1fef029343f7f91dfc9fcf0af8f6a791ffeae428e61fce673886be9f51011e78f3872305e79be8782a1975e4113b6ce473bb26fa4a67cac553a3af2465ffdc8c0e724f6380a27a94f1f9d16c2fddcfdacb427c615dbb490428d8922f21804f19faaf4a0ffa90fd692288868957d1490b52e7a503df46fdff5f833664c4390445e8b499ea03846a8316a04781f35a04c94567d97d421f82b603b5d456f0ae036b45c42b6d018e1e519ac8c95a45a452e9ded2679d30efcf4f0023bc82f7e8dc408d0e9e35ab727cc289f34aa4fbebccedc4f5844ee6e5be984bf3beff7ef3b91068372fb60f289e94e0406843705293c962128504330b89e998c476358be51e66010fda0036552f9b7b8676c6abce39de284a249cbb9300a001fb62131219ccc9a57c9501efce50e7b5afc3a49057ed0fb5eaf8f61f59f8d2d960bcdc1771fdf0c14034918b689bb5550a02c059da4a341076ac62ae4b0c795027f843657491cbbbe0f50e67396d0067eaa2a05dc6ca72a10f0a4042137932ced2bf2836b844379e87d279c9b0ea046db483aaee84a75332b6f0698acab237d41028b4cc8d8094adf03aade52fa7e14e87b5bb4ebddd20c819f4da8f35b3a9ac26ad34cb7f11b3ca8b0db5964a6c3c1c08dee17881fe2bfcffacd3b34e9cdcdf424e3d542a5b1ab2b21333bed0aa3d5b9a7cfab975b48d7525cae986ba2d146fb96d9d0c635a5ca75837375563f18553985e426bd9fcadbdca51701cad290ea6a8741c45298aba6c222dc06f27cef850fcc933788b800788e12402a84edeb6ce21472efba675f7cf2db34cde3c7c191d746a5f54b9db1b74385dfd882a64b25d9a0d206aab186a231309ef59a86809191f31f0390c0590b59f08db2e36a1a5872689f3a17c3fbdf9c415f1db2a8ba34b43b6d164a39db7f2c4821ce093753da71cd9e8a9ca11b5c5811a710b055fa431a67d58929c674bd7295198692e33cfb9e0b7d73c9dd7d8d01329ef6a8c9ed53133b00405158b639b708fedfc9349ccbf536da21a7dc7e6df95eab0571dd2b37d27c4419858f3a1828c3055524087aef330f16ca8bce1f952a193cb78a40bc8dd3814b2415e4c392f0ef6682724b2f1a9101a552a471a89bc5c00fce3986fb202f04c6f0811174eaff07013a62ec01aec0ffb4726319ce83eb798342a46e3bff73764b7808e70d80a5431e657672614de94aaf6447220dc2b4f389452b7c5e039d461b8efa48940b548afc4835a486a047c32440a06d5aa0d4ba0f8a97e1d56544aca1a4a8e8cf4a8f2bb344bd4fc65040820cd4261935ef827560e857c49cb48aadd32c2f4fe222b71e4c9bc187fafcb29eae2cc2468222bcc37b8d1d62e9bba5c81149d060f78e7da546b02e4bf6da8f15be7bd4a4c29eb6dea599de698b68143fe5b27c2d0fa9dd0fe747b0a55a6c3a6db91cf18eca191bc391585fa22d535a8ec402a86dda913467b23002b4eb8ef8a6ddf32531217c53cc48cb29360cefa87f193d729731689682fb34a80754ff5502ea19a642cca01c2232fe4506c1bb46809b5bcdabf120e08a11eee585a527864d4711bdbeb1731428c864a49ec79ad3cd615d0401fdda77cc055417bc66c89adf0a6e2795ef662e2081eeb51529966cdafabd08a0d5d8c324d48478834ec789c79c5c1c0865c225c3e9971c8ee1ada6f6774861e7d08965524df38e92fa66655cb48deda5f223534613d71252198cffd1a23efd2b41ec234a765ee727cb6c144502391dcc4093dfccc2f958e870bb05ec2bf8a5a013fee6d8acbed132440d35a2ca7253977957bb8420a7adaae874d40fe6e2e3763c3cae254a343b9cadcb6ec7f28dd015eadbd3c36e6b09e0180ec9f8f72f5bdb7ae88552ac120fb602022672a0c109f1053ac731887d11c33f276ba92c6f98e05ae56311876706bfe5f4ca6d5b2719dd411b3a1d419c3fa20388b8c1716d068141a2627aab3aafc3a9589c892015deacadb3aa879a3eeb02ec85cd61df9b8f9c80de6d3f6ae4dac6b3ea96214d6dd6c734c152467788f2a472b24dd54fa54319890b05342960197dcccae8465ace7a7fba957cfe97796feca697bc70dbaec681b146be4f9e498ba8f25140241242ac47dc26a632d51e40cc9d1008b5e9bb11ed16dfbf831170392f38c13d12c05211eb9fa67457b0f4836de6cebb18cef9c245ba2075f81ff22f9897ab03823cb92965a8f90029a26797254843937011d2fed7a468811a738ca6f0ba97147874dbc41e7a21b73aec7a8b9b2e16320c251cee099ad24aae8939127c3f798514b62dee62f966b90479d709241340738e6ff394f47e7582ec5d44511b30fc2f86c4a69e27fda56ebb45c470acb341d7a5b692ad10153436a5cc423630024198b77b85ee5c4cad00a02daffbac820a6b217d1b19c7e8155b64256d0ea7cc090f84f6fd53f49c9d23cda8ddfee108a09859a36ed0685a32618252bf35d6a53166c6ef0344a5e7df77403e536ea54f6f3c4ad12ae382209f4b8ab74da18f8426d79511f5b387af3c93992a2dff2accdfb7b46b3239f2750508c24b3f978dd45c2b6f96acafc4791d7689df22444925977cb5c129e47b51cc337678999f52815c9895b93f9f3f6b74354413dc7517abc08340712a8be81d610a63e9bdbccf9853c8fc8e78a4576156566b5626d3fae113797c07a9942aaf979c0348a563a6ff7218760c40198fc04248e14757347929faf526b61082090082f80acd558a72aed9c47866c093a25adc75cf12ee1575676deab51714663931bfce8807245fe1914c77c65896e86ae312329d00651f122084ca80e1fd7ea596ff17df084891a8499539b86f721b7e2bf4b9fbb13db2125c629346527eafd584550ed235191a129fd58079b8a7e2184382d5c303b9e22441d1fc174a650f4c92b470cd0933abcbe5b5261282d5a1e487f1f3a03bbb2c4e1580cd071e6d2e511b275d14d35adb469a75bb9ef86d71b091f80f0894b9563c729a127250cb2cb61f1af756b45d0bade8e8e343a293161b8e81b8cb587d2b939e537c87e650ce6e87d75e765d75cf7ba5f4a5b635211f3d13afb13e6adfcaabfa82f23a490b17bde8516ccc7dee47ff103e7379f27a3efc2ac7bdd48548e0a898e0e5e99554ca3e84958afef8355a54eefc82a0e305776fafeac4386f1058632214cad7b9ed8b66e0660e8fd16170400e400b8f2780257c4b05aa5d9378f554fa114af05b1c9220b262aa863df77dc453e51a1ecc30caec7284f53c7220b59c2d0b06fd84c27fda3d9ef70b201251be2d4156f3049e59abe9b682199b0824a47c8e0ec971534dfc26e974465f7181c17f8c47bc0a6303162082779b6842001aa5d6c09cb9dbefa24fed72c6563648ea534a3f24781452cbf2a2b42184b377c88d90ad5e85dc858b108753f3fafffaffefc9c303348615377c0e613da8a1bee50312aa66d029ac6109472639c80a325c088328ab79e83a73321d9570a8e305f3cf938ef4947e524c6d352b97923218890c51ed646239bc3b84eaf0d125dc303b6868788a4a772027073bee0cedc2c747e54a8ad717d36d5bb9295745e705da9a4b0366b1afa98935ff431077a31dfba42ebe89b1b0feceecfd2821cd64537cd5224eaa31233279fc9c411d0c60d20246d894c15f847d3d52fc702bf7603f247232f7d248e07343f09af1958a523ca06e49a6466e4b8cc179f0d0e525841193de3412c2aa2aaa38976b3f64aca47264afe026407934abf4332525a07670485a8abc5f5179898750e580636fbd65207f6d7da3a3202427c11d8d14279fbf273e0080bcc0d17062e7206ed913448873e8596acea192d451da3e59085fcaf31e36a4e61af58976969e498e396459cda490eeeca2e72187ba99e0de15f08404cdd5a6dc78e9d3b530a84402e3515e56e557d6300e1eadbb59b433d6c87a58dcb87eb1dae784d3d22f9155ad15f5c5343f04ead8be7d693bdea5b40dad27a5b093c6848504981f068b2d4372881729f2bea85bc1a4ef8d36aa9229e750897c1cb935346ba37c8b4d0fe41db8fb000d68e08f32c24e86f9c915ff9f06455f290357819a7f9496a17addbd73dc9b57232cf1d5e7c35e219eeae586bb2c607bd6cd5a1e81aae713d54ba47631c21c20c088c1f687dc13426607e3234aac027cfab589d4fbeb8c6d24737223e806f15a870130e8bd8cc878cb34838917b2d6648b86988e9e302b5b6b7eb3f41a2bdbceb6013c0899ff153f6d9dc96280fc325af90d357d1e8f99f16d0e1d35aa782219fb840fcdc5709f8c1e69ca7824427410fa0015da6af8da74fec757cacd8b0cf232631f0477350382febc1ca2c37332969eb84a32c48e67a311d79e2b02e93944b9e7c91cc2e672790a58c2b6b22e73594cf632fa00c43a3f2a0466c1a955d56d674ed4011a8ef68a946eba5b9d370040e713438aca3638f026a3524beed216bd02470efbb0490946579039babaac0e68bb7699c6f8367d8f54d154e222fc396cdca8dfa0f7267c36a85278f762b1fe0390ffbd44297fae5c32e95bd3be4c319cdf3765e81e9221eaa8a144ec14c8ec26ee98951f1cd05f6293757d1ae457178318fdeb386eb47094900772f7194fcc424efe5bc6b4e9408ec8e4febee2f45bffb0198c92eab222ba2594df3ab2be9fb1c912b2004e823170fc8140fad6fd65c8a97de87f35299a7d4950a19623d5eac7f55099c3ea823a8d09954a66210ce79c543349291f7775993acc617ef918d9bd5987cd7ff94bc0462e3b0106c9958fd1a0225e0", 0x1000}, {&(0x7f00000005c0)="2e7ea83b8aaa861d03e4a2fbd95ebf203ca6cc3f00008b33cd58526183e5388b3923bf54906499bf9cc6d960d9380b4e1285cd2bd8d3d32c3285b7a1ef598ad160ac5ff738ec98375b58995ee041c9a92f783b84686b05db20b7c718ee00677f6a82548d8eaea039b5a9036b8f067a338d365866ec8c8b0200f43d06e8ce27af1fe5d890c283754c2fe40731c7ce355d855d0347db4c925709cdb00e4e3a2c83bb696ac18395ae57156b539ee788e772f573da7c8b731b41916c2f9fb6f9d170afcb5700a58adbd61e14f31fc86af608505ec0d44cbb1ffa490d9216923b30fc1a82ad307db526357d0a999a057b", 0xee}], 0x7, &(0x7f0000000700)=[@timestamping={{0x10, 0x1, 0x25, 0x100}}, @txtime={{0x14, 0x1, 0x3d, 0x9}}, @mark={{0x10, 0x1, 0x24, 0x4fb0e601}}, @timestamping={{0x10, 0x1, 0x25, 0x80000000}}, @timestamping={{0x10, 0x1, 0x25, 0x5}}, @timestamping={{0x10, 0x1, 0x25, 0xde}}, @mark={{0x10, 0x1, 0x24, 0x101}}, @timestamping={{0x10, 0x1, 0x25, 0x7}}, @timestamping={{0x10, 0x1, 0x25, 0x6}}, @txtime={{0x14, 0x1, 0x3d, 0x400}}], 0xa8}}], 0x2, 0xc801) 16:06:57 executing program 0: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r3, 0x0, 0x809) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x80) (async) sendmmsg$sock(r0, &(0x7f00000007c0)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)="a4ed52546e41eff58c770f661ab5b05746ee095ebd2ea674ad89e53dfe914159d08ea37b6dd12db50b81d1d6be8039727568b2e6f1abdd1fd2fa8f31d21c2540d647d270c2a084c89c39ca4948f40c027ea4d60bcedfce9c3efde4a43baac1ad0b9164a67f69a49964fe94c47bbc1d42acb4fbda8ea0b180cb529820a54184e2c0b1a2ace63651a6637135b70a4e5754806c167abca8a29e2bacc9a80fa0a041026f90a356b9b1f4cabdd654121974a7fb4ffe1ad81e1d3010f0340cd835029b5d6323f8e268195e38f73c8cfd22b591", 0xd0}, {&(0x7f0000000f00)="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", 0x1000}, {&(0x7f0000000180)="1574618a87ac6f82a1cd009a25e31b29ed63533c090408c50ff2c0037bfda90a21290f6ab635f0b8784eb1d3c04dc03e13a6a0241adda9177b06c970", 0x3c}], 0x3, &(0x7f0000000200)=[@mark={{0x10}}, @timestamping={{0x10, 0x1, 0x25, 0x2}}], 0x20}}, {{&(0x7f0000000240)=@l2tp={0x2, 0x0, @private=0xa010100, 0x1}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000002c0)="42420d21b4655b21f2355203c6187fc37e9ba2598435d920af30e196d7806f91bbb0bcec26c4d59b96e1ad167d28c8668a4da700f97504054e110360ad00396266c29e8534f672295acfd1c715d8391e914f3ca8bae79f900af9", 0x5a}, {&(0x7f0000000340)="c430791bfa93ed61c81d47a3c8128662ebf23b1e102962f70371e274927d5a31c0e7129826cdd082d4ddd9cb0a2d36df3fb87186333a3e80a4b4402140d51844fac9b6b81392c663f332facdfa7b2560279328b0087763a235927839bcf90eba34e06d51f89860a6c49cbf103a89e0829f231095f2bad374fc8395c70398b95a7c81241647e331986ce0b36ce34a10635f2d023ee6774de0cf28084c882c2f6659c368e70ebe04ed89f8686fadbf7805e2ebeab0e6adda7f7333b3d6a027bc6d7744998fd8bd147d4963daa69e4059c453b31a78ab18bea77ab7f8e5c4a37bcadc45932ce66ff6f3da8bf8644bd44b79c6", 0xf1}, {&(0x7f0000000440)="b57c5ef5ed4eb95bebccb7f5687b0c26a198b638199dcfef6d6e32c98f6e5099fa83f4454be4b1e8270e04ede0143227bb9ad3513dfb6d9fa7a5b3b9b7b9ca8c2be8f6529ad48bcac3dfc861ad4397558b9557f1cb3cadf0a08d12cc5cf1f66e21569d1bfc4625f6906c222f35275273c632bd18b4b3a250c2ef6d8a137ff800694e0d3729e5b83302f4bf57fe8428c55aceaad6ccbda1e79c07c4cf660fc005b7c716b0b5859724ee73d2f0869c4276a070fefa4f51cad54c2251138282b0cb3b4ac808f64e075a2fb13a76afed0d14c050630f6f2cab028873e8092d", 0xdd}, {&(0x7f0000000540)="30fcd7f12660dfe1700e47428201bf3b4ad5babfd8c9174ccb44c8d5ef64bcd3e94e40e972c5503db3f7917bee21fed8ead731c4510e41eeadee92d0742bf9a7", 0x40}, {&(0x7f0000000580)="ec11394d00d10345b339212a0056e7a9b81ae67a93963d8b2db5479e80", 0x1d}, {&(0x7f0000001f00)="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", 0x1000}, {&(0x7f00000005c0)="2e7ea83b8aaa861d03e4a2fbd95ebf203ca6cc3f00008b33cd58526183e5388b3923bf54906499bf9cc6d960d9380b4e1285cd2bd8d3d32c3285b7a1ef598ad160ac5ff738ec98375b58995ee041c9a92f783b84686b05db20b7c718ee00677f6a82548d8eaea039b5a9036b8f067a338d365866ec8c8b0200f43d06e8ce27af1fe5d890c283754c2fe40731c7ce355d855d0347db4c925709cdb00e4e3a2c83bb696ac18395ae57156b539ee788e772f573da7c8b731b41916c2f9fb6f9d170afcb5700a58adbd61e14f31fc86af608505ec0d44cbb1ffa490d9216923b30fc1a82ad307db526357d0a999a057b", 0xee}], 0x7, &(0x7f0000000700)=[@timestamping={{0x10, 0x1, 0x25, 0x100}}, @txtime={{0x14, 0x1, 0x3d, 0x9}}, @mark={{0x10, 0x1, 0x24, 0x4fb0e601}}, @timestamping={{0x10, 0x1, 0x25, 0x80000000}}, @timestamping={{0x10, 0x1, 0x25, 0x5}}, @timestamping={{0x10, 0x1, 0x25, 0xde}}, @mark={{0x10, 0x1, 0x24, 0x101}}, @timestamping={{0x10, 0x1, 0x25, 0x7}}, @timestamping={{0x10, 0x1, 0x25, 0x6}}, @txtime={{0x14, 0x1, 0x3d, 0x400}}], 0xa8}}], 0x2, 0xc801) 16:06:57 executing program 0: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) (async, rerun: 64) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) (rerun: 64) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 32) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r3, 0x0, 0x809) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0x0, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x80) (async) sendmmsg$sock(r0, &(0x7f00000007c0)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)="a4ed52546e41eff58c770f661ab5b05746ee095ebd2ea674ad89e53dfe914159d08ea37b6dd12db50b81d1d6be8039727568b2e6f1abdd1fd2fa8f31d21c2540d647d270c2a084c89c39ca4948f40c027ea4d60bcedfce9c3efde4a43baac1ad0b9164a67f69a49964fe94c47bbc1d42acb4fbda8ea0b180cb529820a54184e2c0b1a2ace63651a6637135b70a4e5754806c167abca8a29e2bacc9a80fa0a041026f90a356b9b1f4cabdd654121974a7fb4ffe1ad81e1d3010f0340cd835029b5d6323f8e268195e38f73c8cfd22b591", 0xd0}, {&(0x7f0000000f00)="a5fe354380c7745440030c9a1fdffe304a62d8c838de0f33e77d14dfbbab9450f1ef74eb34c2da743ec7edde830a63a981b32c9c75325c88da8d5d1327c2efcdf9787aad3779be444e9c6ff78b014b16c8e8b02cdb95ac9716d67aad69bfa1bc80401bb207d8630a26dc36db11cfa24b8d023a95a8088c0d7e3899650ad10ea1cb61bcd7088f53aa8a559a3ad841f1bff16845b43de32c166b3c53a5078f3807608228f2097d5915a4c7d8ab89c7db45c9cb505de231d778a0f93a763cdfd18a9beacde192221dab2f9b12a8265dc064665ef19a1a2d86c4acf68b20c9f02540014269b7a800b9734df5fae6f57b69494adfbeb9c7298c17bb47c60ceba154628a6b2670c7c5a45aad7ba75fd7b3ef2608d3f23cd66380259cb746b25c884facddb38520e1a7d4576211184324a4c08379c99c59a2bcd853e48dd5d921fe733fc288060b387748056d06fb91711c33a70348e251c56bc135b1fab6b9610b302ef9dbb6084e4640381f1053f25e7f6a462cc68bb6968cedc7956ce75437e7a52e11ad74c2f016b3023a4a2c6909f82462100d50b2637f9ebac43f06f181c74b4f7c200eb961c7c96a14fc7dad769532b47431b0defd8b4e30d324014b20f27ac23775a96f30dcc1084bbd1f7b4c83b1414d3c6f957dcced66f424a81427cb33cc32462d8ed918122aff57b8392b5b54cbc06be6031ba6947eee09123c93aa7644d7ea913f8519c2adbdfdcca9cc9c440149c0bcccd439fb5b64fcd2fbe043ca69e3b1769068832d29343d5888b5cc18f203966579ea9e7e286a7b85bf3f74a2db5b98e6cc6a92f0e52b1a90703784216c222ba1654330b4d5028fbb8d1f2621d9a6388b63193ac00239bd94d6995f3c7b90d1a3eee65e7927b634ef0e9df2d05c36a0b1c07970012b8f824a6b5f9b9127e23e49eaf44d9f8d8f975d532bf8c51ddb8abb872c22c4ed56333791f3cdde13372d4cea4f0e5fdf408faae76c1752b2f590e3b7b76095750c0a00121ac23e08c4710a5178bdea4041e4222a4c5b257da20a137724d07677bc8e5f8055188a253477fa6b72062f7d6652fcbfc96462b44ee95df08075bc3945c7b49c036eef3f0f274773715c9263a6f87308899e27e0eb16a14feff1e42bf776a4f859a0a730c8d54b90beee47d920c05d2178da0d1a356d4e0d79a412cb1d64617b3aa9bdecbb1a52adf6f6aaac2cf2277b128ce7abd7489c692ae78b6150a9ef92410e4d2aac997562c7995f5dba7f70f15ee90c192f15f28596bbb6dc39ce7814b35e754a25d3fa537d51c3e6b9645c6c69d2da53afe94982623c520c938b28ce705fa0c866bedc81f3ed5775e70ded989d23fbd8efee359b3090477ff093820866d65e7e7981467a44a5282be1f45e38fabff150b53933fb682bbf248a6d4e2c2270be358bf2bc77f6c38b3bb7c280e148a167074543315b333b70447ae4ff7354fb18d7e5ffc85a7ccfa58f5e4612d58f7e3126b5b997784f3265dd20c673c08c3adf741c5aac1e1bdc58d94f9f8bcbc48d6cda77f66325a9d1194730d8fa897dcca6cd851c706ab40e2200d530a0f525b1ed95d64c5ad7c6b8a367a9f89bf317568d306b931571a22643f05e22a5cfd60b7831db222adde5f4c2949a120825bd77dc10b0948fdd2314e32057bf8eb789553ad1e20ba064e66e36ef0049d594f18b3efd7f504e8cb21612559c4f1847f592384701f121f5bbb4f090337ce386f8d99f8ca992dd1cf9aab7fdb3e0a220fb3733951f2a41c0ea45d0b8ae2c60bed38be7d38efe24284907b94fbbe7c17a25e88e99c0467ae899bbb0e26eee5473ae26b49f34922d8169931ab0d324cc6c8aa7ae0e67c9b77fbb1145b29a5e592c98cd86f598c00a0f353973a6c243f0bf1cb2b8827e30d2d0ef92541567af20e1e34eb2a1517161d52bd84f80992d97c3eddf81f5b7e20df1df704868c78acca46314f1fdbc1ebfcb34591b4a601d0124923f3679470de2046287513a67021bff707e3c410626b3e8cc2dcde254f83480ffcb92117dfea2098235e00184b93ac8604742f5eb34b8965b901a63e127c5e721d83615451bb979733e7862ff8be2595643bce5e07754e98f1b11aa10a36d427005f3cea29c1873d7af86f1cb2bf5557e708158681a7ebf11ae2b8a1c0b98c990aedf96bcd78086659b144ddae3b631d9c6b1f5579dc76ed6f13097f05c87f297a9fea48e6a2d5e11b0120b44552d3342e926278fae43fb24e43d26a7f99654ec891d3b2eccbc723bf45dfd14106f1330dae843753ba8c9937bcd0cd7e89068824b56f8e483cd95109c1cca6599a0ecbe06b766f47f3d89c18500a6afd9605b22943ba6b653960ffe99373b10d3de8e5f71b353d4f32bfee1bb60a1daf2cedf8cdd58b338694c5cbae674febb4e82b14da699172eed685618a536b53125ae5f794edc1941450b7f4efef8c45b7c1bdc3dae09a2a95a8c5c9fb72ed685a45bb964cf7497080a543add52afacbd19c82bba4c15a363327a3b88bad0deb059e27eabb9426363087f642d489d2cd3f1a08954cfab5ee60a64339c77f1b09df22bacc4120db3e779938322c7826414d4e37fcc3636a8376b862708c9adc5ebe675286a767e4652d06e2e41f59cec5207b76adfd35cac3a52f4057af44419e5d68b95fbbf74a889f0244184445d3cfa2c5b3e8f37ea8b8a110437282b4defef31052b946d141f2facfef99b06389a040906f829a88ad366c163cc497140f97e0093fa4017f43284a6c41b9035d0c850fad3b12e3f7eaa25993e78340a660e2b52116f91ce9b50fa3bdf48c7600efe40fec912736b4b983701113fd86a4858e15da1ad1c742850af8c5fefe3f0f195d9a0a4cb37a1107abebcf32167ab3504a4f29ac8f74c5e92a2053bfc7168bc5598ea2243c6edae2d981c9edaf548ab7f5498d9c1628be5f17aa083d87114d9f03c804c81ef80f7ed2a3b62229e3471930782165385bf05d8454fdf5ed78fba79f0e13cf499eccee660d18f80dd6c7fb9f7ebd14718bf6a1884bad959a18e421efd9b07645badb5cb46515efa32b4db4d98811ef2e88edb78f5b86f16e83a3691441c644814ba95a3cd73a723ddd82cdf939b5df38246e4b99f23349ec1a66f540aee13c4d4285b696d2c6f58965d41a8b0e06355fc8537622ef22e4e1450d4cba8cc3fd076493590cf38c5a0cdc706bdd8a05aeca7ae1102ecce1110d910a6582bc0eb001fcfc8fc44da8b40aa4491cc87a78031a8905449e30a18ad07dca9f05226a3e76e90648c800a5b54a2a81eee7a47499c91a206f073a49cedd9ed0c07fb6f7517706c2d8e4c06fd238fa0eb5f959739b151631700f87e753f744ee02facd0add19f9a63680abf8a6719a76e6ad3d35fe7addb5032eedf35bdc87a9953ab97752517c41e5123e8ee75d1923fdf112847cb7769609c45d9d481c1b518ef217b01eb291f3712e47cdf78df96002278b945cfbe9301e7743ba1e8197ac47fe74a063dc7def21e0b9328ae9305bf542a95830f8448d1e559916df39cf3993cd50c1ff38de710c2733229577a6240c4fdadf7d33d8b68653cce3160a606620bc7de998394328178c44f9b5a8219092459bfba2b1813014ca209f51b767b0ce2c75b58af70273b7ae222834db86debd543649635b60ae05ec85f5223b4b0a65eec4459bc07dd3b3ef285e475572146ee649c1d918b98bddc1babf5e1138135c4003963715262ded6bceba0ddeba95285214699a41efd2c056d46bbfccfd5fd0654f51725d55c09e84e8dba2a0574faedec8459d7b0fcb598f1a6c1608aab827c5f5eaa374c6e568ad7a7fb73b63348207138cf86ab2ef77c61c3dab7089a0ff103b4aedfbb8d7961b804bc7e559834bc6ab8921ffd31f776d8e4edc93dd524bcf032fadfbc39141736b88ca0a7784132bef4fe0882685f067be3491191b1f385e161f60c8dd32f35d8e3f20f38d3e6f6a724d21bc978eb219bf8ee5c00f26e13136d838f54737d6e7811618b79b824bdc22bb05535a889696c1171989e8c3993a182350d7eec9aaf968d0020eabb6e7eff4631016b19e0280d0396bd85fd7a71ae509d3d61539401b7a6eca025a54dbd6b806a0c02a7abc2e0d599a7ba949aa5abc52e0834828aad10c99a5da4edc3784d9e91a8c8dc4d7d8dea7b9318127cf55d619bc944de8b029eefca5000760a1714990ffb9b636f4f084de770c29663f4f11f096e210e96023cec2af35e7604e2c4639c5bbb0cbf6841eec184f9efecdf53dfdea9e31b821a5fc75abe5b7db535e538fe71481cd559f00b3a4e55c06863adbfdf2827b97a43835a5c29a792d36b3f2631b59f8fbaa4717acc0b89fd52cd40ad6299fabc97f7b5c3a78261c04699a9977c07d82558d700e604fe7f12f4f9c9e21e3d3c456bfd9c9669ebfadf51364199557398e751d67ec8eea6274dc7355c98c9c533ed91a477a85d19d68e22d430697cb550629f360badc2621c32871518c430db333d218de464225115a569dd0941fbe41215e1530d63ec4f0e4a4cafbca75a9986031a3f03715fd2b55e00e1927bf3276101baa6ad94d0ddd2363a0a51770a625d79392b3aa92bd219141b853a8ac4276c4e140448f8e8fac85b7d59d8db8971b8c5f40df6fb19c7f9f3ddd864adb78ea599b374c12027e56adef915938f6f4be09fa6ac01eb7ef0829de1da9b7c468a561e36dc075d1165c3b783d720ed06ed4219f073a92df922a4beb9bd85d3cc5fcbf13370dba28ce457857d37cca3773940ec3c8f908c87ac77c144b2edc8eaa0a69b4ce6e0e6a8fb9ced64329837a6e346c81d2aba70d727790d436f5a2fb4933e1f0e2d9c66045e0b45a23641b4f8d029ced118476d393b1a41ef4a40c9196583bca78e9f56fcc1de4e390b5f3e4f7ad0acc578e10d83d70b7cc84bf6eda9c6b2662b27429a2ee4d02fd0af3130b8547af503724d9a35f5831ff4a58abc830c09083b1a00d450e566b3bac74b6892f9aaf6fb24cee3568de78cd4cbf76a84514d054282f8718f32d975e93b39ff76fb6d319b52638b71285b74f50daea38b0bae4feeaffae85b4187e592d2faa5eb6799ed2172c8315170dbc89a483bbc49c1f9018132626bb2f312909d0d9c637db07a4d0c93373661e8620dbb6370ca14bf5615462d9acadadc6ddf24f272cdf0125a21dfcf403d0f508d7059a358c9ed4572016c8ea4877b6124ccda841dbcc8ae4fd516c3f143e8661f52de4bcebebbd0f682a5d1fe4c6bb94e0f3ab92c5f0755abeeb944250842f6a02f857aa4b4b1e76122834340cfb3aa25d3b125e4c0b3ddb4440aa3d0a0b30573f3030118ade609b71a2c0e1f0ffc51280b350c6abb98b74a2b96207f2325668bd090c309464da50f8b490887bb3364d7343c917352030a55684446f358444490da567cb62d26d7fc28d849e63369435f967e4784b805e984e87a295825bb7555a36bcc5dbfcd58b5aef2696ab12c1acc59227224c52d0186ee0f782e7b32abe7ef6801ba54f2234a2ec1ceb35f1ccbc65b224ff3e015f45ffcc2471919bb5c7a4ebac06fb958473190fde62d52a2d208104879905eb62f5f637415bc9ea91f1fde896058ea1b93a08345f2667e2840ec9d89aaef45f7fbbd3312355e85f9e27a93c1288117ffadf1f7d49a2ace03dee304611db24a98f8b07e4c3db418f62db869430b559853f2fcc271a70ad4ffbe4b162945b5117e0fd78933747b594a1792175575d683201c73f2ba36767be504b5c4dbf00258c01e51d4032b150b933fe0a07f327f1c19b670819087", 0x1000}, {&(0x7f0000000180)="1574618a87ac6f82a1cd009a25e31b29ed63533c090408c50ff2c0037bfda90a21290f6ab635f0b8784eb1d3c04dc03e13a6a0241adda9177b06c970", 0x3c}], 0x3, &(0x7f0000000200)=[@mark={{0x10}}, @timestamping={{0x10, 0x1, 0x25, 0x2}}], 0x20}}, {{&(0x7f0000000240)=@l2tp={0x2, 0x0, @private=0xa010100, 0x1}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000002c0)="42420d21b4655b21f2355203c6187fc37e9ba2598435d920af30e196d7806f91bbb0bcec26c4d59b96e1ad167d28c8668a4da700f97504054e110360ad00396266c29e8534f672295acfd1c715d8391e914f3ca8bae79f900af9", 0x5a}, {&(0x7f0000000340)="c430791bfa93ed61c81d47a3c8128662ebf23b1e102962f70371e274927d5a31c0e7129826cdd082d4ddd9cb0a2d36df3fb87186333a3e80a4b4402140d51844fac9b6b81392c663f332facdfa7b2560279328b0087763a235927839bcf90eba34e06d51f89860a6c49cbf103a89e0829f231095f2bad374fc8395c70398b95a7c81241647e331986ce0b36ce34a10635f2d023ee6774de0cf28084c882c2f6659c368e70ebe04ed89f8686fadbf7805e2ebeab0e6adda7f7333b3d6a027bc6d7744998fd8bd147d4963daa69e4059c453b31a78ab18bea77ab7f8e5c4a37bcadc45932ce66ff6f3da8bf8644bd44b79c6", 0xf1}, {&(0x7f0000000440)="b57c5ef5ed4eb95bebccb7f5687b0c26a198b638199dcfef6d6e32c98f6e5099fa83f4454be4b1e8270e04ede0143227bb9ad3513dfb6d9fa7a5b3b9b7b9ca8c2be8f6529ad48bcac3dfc861ad4397558b9557f1cb3cadf0a08d12cc5cf1f66e21569d1bfc4625f6906c222f35275273c632bd18b4b3a250c2ef6d8a137ff800694e0d3729e5b83302f4bf57fe8428c55aceaad6ccbda1e79c07c4cf660fc005b7c716b0b5859724ee73d2f0869c4276a070fefa4f51cad54c2251138282b0cb3b4ac808f64e075a2fb13a76afed0d14c050630f6f2cab028873e8092d", 0xdd}, {&(0x7f0000000540)="30fcd7f12660dfe1700e47428201bf3b4ad5babfd8c9174ccb44c8d5ef64bcd3e94e40e972c5503db3f7917bee21fed8ead731c4510e41eeadee92d0742bf9a7", 0x40}, {&(0x7f0000000580)="ec11394d00d10345b339212a0056e7a9b81ae67a93963d8b2db5479e80", 0x1d}, {&(0x7f0000001f00)="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", 0x1000}, {&(0x7f00000005c0)="2e7ea83b8aaa861d03e4a2fbd95ebf203ca6cc3f00008b33cd58526183e5388b3923bf54906499bf9cc6d960d9380b4e1285cd2bd8d3d32c3285b7a1ef598ad160ac5ff738ec98375b58995ee041c9a92f783b84686b05db20b7c718ee00677f6a82548d8eaea039b5a9036b8f067a338d365866ec8c8b0200f43d06e8ce27af1fe5d890c283754c2fe40731c7ce355d855d0347db4c925709cdb00e4e3a2c83bb696ac18395ae57156b539ee788e772f573da7c8b731b41916c2f9fb6f9d170afcb5700a58adbd61e14f31fc86af608505ec0d44cbb1ffa490d9216923b30fc1a82ad307db526357d0a999a057b", 0xee}], 0x7, &(0x7f0000000700)=[@timestamping={{0x10, 0x1, 0x25, 0x100}}, @txtime={{0x14, 0x1, 0x3d, 0x9}}, @mark={{0x10, 0x1, 0x24, 0x4fb0e601}}, @timestamping={{0x10, 0x1, 0x25, 0x80000000}}, @timestamping={{0x10, 0x1, 0x25, 0x5}}, @timestamping={{0x10, 0x1, 0x25, 0xde}}, @mark={{0x10, 0x1, 0x24, 0x101}}, @timestamping={{0x10, 0x1, 0x25, 0x7}}, @timestamping={{0x10, 0x1, 0x25, 0x6}}, @txtime={{0x14, 0x1, 0x3d, 0x400}}], 0xa8}}], 0x2, 0xc801) 16:06:57 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x80) inotify_init() 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0x0, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 0: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) (async) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r3, 0x0, 0x809) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x80) (async) inotify_init() 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0x0, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x80) inotify_init() openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (async) inotify_add_watch(r0, 0x0, 0x80) (async) inotify_init() (async) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0x0, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x12c, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0xbae61ce206a3efa9}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x4c, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2214}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe654}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30f29acc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32e2fd5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb65}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x542f200d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3170}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x5c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc35a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbb7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa7c5}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa848}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x67a32ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5940}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39ed7004}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb737}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7b4c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x28503e66}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4010}, 0x10) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x80) 16:06:57 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROM_SEND_PACKET(r1, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@bridge_dellink={0x28, 0x11, 0x2, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x40}, [@IFLA_MASTER={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000000) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x8) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 16:06:57 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x12c, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0xbae61ce206a3efa9}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x4c, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2214}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe654}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30f29acc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32e2fd5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb65}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x542f200d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3170}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x5c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc35a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbb7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa7c5}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa848}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x67a32ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5940}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39ed7004}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb737}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7b4c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x28503e66}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4010}, 0x10) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x80) (async) inotify_add_watch(r0, 0x0, 0x80) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0x0, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x12c, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0xbae61ce206a3efa9}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x4c, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2214}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe654}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30f29acc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32e2fd5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb65}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x542f200d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3170}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x5c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc35a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbb7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa7c5}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa848}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x67a32ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5940}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39ed7004}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb737}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7b4c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x28503e66}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4010}, 0x10) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x80) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x12c, 0x0, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0xbae61ce206a3efa9}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x4c, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2214}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe654}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30f29acc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32e2fd5f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb65}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x542f200d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3170}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x5c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc35a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbb7d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa7c5}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa848}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x67a32ad}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5940}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x39ed7004}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb737}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7b4c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x28503e66}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4010}, 0x10) (async) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (async) inotify_add_watch(r0, 0x0, 0x80) (async) 16:06:57 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROM_SEND_PACKET(r1, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) (async) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@bridge_dellink={0x28, 0x11, 0x2, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x40}, [@IFLA_MASTER={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000000) (async) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x8) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 16:06:57 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0x0, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000f00)={0x3e4, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_WANTED={0x2a0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc6, 0x5, "09a7aaabe88b1b9a0650aa9d3e7769f70a013b68bb30c6f84885b9d98ba89929d6f4305125aa1120f3abd5da43e2e856b7a74bc8da7a549826bfc1ac74a07c67bd8695291a34363d5b96b64112b23ca2dbde243eb5cf80efba2e324be80e1df78f95687ff9f700c5f8bf4a77cafbcced52808a3d4407b72fa7bc3ad135ac0f38a7c006e2005a7645a488c956b9c624148c1a721935664ed0509a93ea898da4863ba2e76fbcd1e37810835f4afb0dae1849a2dac2c3a99a16f8de3ff2e41150ae9fa0"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x9c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x134, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',\xb1:\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\\'^&%$^:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff800}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '+-\x8c}\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/$-+^]:*@\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7e8}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x118, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10c, 0x3, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$#.\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8fd2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\'@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ca}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2d73e117}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffffd}]}]}, 0x3e4}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) r1 = openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x5c481237a5701e7e, 0x0) ioctl$CDROMREADMODE1(r1, 0x530d, &(0x7f0000000040)={0x7, 0x9, 0x8, 0x81, 0x6, 0x5}) inotify_add_watch(r0, 0x0, 0x80) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 16:06:57 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROM_SEND_PACKET(r1, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) (async, rerun: 32) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@bridge_dellink={0x28, 0x11, 0x2, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x40}, [@IFLA_MASTER={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000000) (async, rerun: 32) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x8) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0x0, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000f00)={0x3e4, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_WANTED={0x2a0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc6, 0x5, "09a7aaabe88b1b9a0650aa9d3e7769f70a013b68bb30c6f84885b9d98ba89929d6f4305125aa1120f3abd5da43e2e856b7a74bc8da7a549826bfc1ac74a07c67bd8695291a34363d5b96b64112b23ca2dbde243eb5cf80efba2e324be80e1df78f95687ff9f700c5f8bf4a77cafbcced52808a3d4407b72fa7bc3ad135ac0f38a7c006e2005a7645a488c956b9c624148c1a721935664ed0509a93ea898da4863ba2e76fbcd1e37810835f4afb0dae1849a2dac2c3a99a16f8de3ff2e41150ae9fa0"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x9c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x134, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',\xb1:\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\\'^&%$^:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff800}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '+-\x8c}\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/$-+^]:*@\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7e8}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x118, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10c, 0x3, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$#.\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8fd2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\'@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ca}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2d73e117}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffffd}]}]}, 0x3e4}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) (async) r1 = openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x5c481237a5701e7e, 0x0) ioctl$CDROMREADMODE1(r1, 0x530d, &(0x7f0000000040)={0x7, 0x9, 0x8, 0x81, 0x6, 0x5}) (async) inotify_add_watch(r0, 0x0, 0x80) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000f00)={0x3e4, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_WANTED={0x2a0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc6, 0x5, "09a7aaabe88b1b9a0650aa9d3e7769f70a013b68bb30c6f84885b9d98ba89929d6f4305125aa1120f3abd5da43e2e856b7a74bc8da7a549826bfc1ac74a07c67bd8695291a34363d5b96b64112b23ca2dbde243eb5cf80efba2e324be80e1df78f95687ff9f700c5f8bf4a77cafbcced52808a3d4407b72fa7bc3ad135ac0f38a7c006e2005a7645a488c956b9c624148c1a721935664ed0509a93ea898da4863ba2e76fbcd1e37810835f4afb0dae1849a2dac2c3a99a16f8de3ff2e41150ae9fa0"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x9c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x134, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',\xb1:\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\\'^&%$^:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff800}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '+-\x8c}\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/$-+^]:*@\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7e8}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x118, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10c, 0x3, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$#.\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8fd2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\'@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ca}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2d73e117}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffffd}]}]}, 0x3e4}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) (async) r1 = openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x5c481237a5701e7e, 0x0) ioctl$CDROMREADMODE1(r1, 0x530d, &(0x7f0000000040)={0x7, 0x9, 0x8, 0x81, 0x6, 0x5}) inotify_add_watch(r0, 0x0, 0x80) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0x0, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000400)={'c', ' *:* ', 'rm\x00'}, 0x9) inotify_add_watch(r0, 0x0, 0x80) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x367, 0x4) sendmmsg$sock(r0, &(0x7f0000000380)=[{{&(0x7f0000000040)=@l2={0x1f, 0x3, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x1000}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="fd9cb785fd99843dc22b3a7cbc098aeadf37197b2d0244c3bbdf57e684f27922106ce0dab2508e450464e01cd2682d27634b382887adf4d5a89524c54cab3bd41b0e08c8c0762c8bc4264698a762b88d02954f74efa5626cb4530121ce532c3f0fae035d21afab24bb89871cd983ae545db9663315ec2b64fd776f349a5f56e0f0bd27d73593a3e1ceb59fd40ae117fd8bd3785d9c7672c0be8c0ed0d5636c4985309f79f160b73a60bafce34130e191ac68af583a14a1af251cdd49ab78498578d93393bc389b", 0xc7}, {&(0x7f00000001c0)="b76a2f8be55bb819535656d815ada79a0d32ca3d257c44fa87b271045784d7b5914ba0158de19d1e4f40dac8ec535aafd423caf69945915ad6baee98a957d5553899de21ebbfbfeac3b73e798c4151818d", 0x51}, {&(0x7f0000000240)="642bca81abf4db63e6ef4a57d7af75b109b9c40429bca64294d05df07945a2791f7f9b0257cb59a3a28e15702da654382ecac24fdd80df840de1c444537bbe5386ec88ee71e61ead2394671859f4a4f24a9e07c66a26a22d06ed846405e7972d0be5e7a1d1d79528a31f4847430ca5d3b0ac5dfeeabf78474698790a77a052ff32e3fbffae440e41629c3b2f54b39738676b13da11bcdd3b54dab69278bef09bccb38f8ff02381234f17ab8612def2556d57a3d17c590df0c5ce9ca1f17891fc2411b6798fd899214240f4a0e719164a040a03d79f487106449a9c7f6c0c74cc12e53ed9a203bd1aec6a77e6deaa6492aa", 0xf1}], 0x3}}], 0x1, 0x8084) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) r1 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r1, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r3 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r2, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r4 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r4, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r6 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r5, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000001000)=@nat={'nat\x00', 0x1b, 0x5, 0x758, 0xec, 0x0, 0xffffffff, 0xec, 0xec, 0x690, 0x690, 0xffffffff, 0x690, 0x690, 0x5, &(0x7f0000000340), {[{{@uncond, 0x0, 0xa4, 0xec}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x4, @ipv4=@loopback, @ipv4=@multicast1, @icmp_id=0x68, @icmp_id=0x67}}}, {{@uncond, 0x0, 0x268, 0x2b0, 0x0, {}, [@common=@srh1={{0x8c}, {0x29, 0x9, 0x81, 0x3, 0x63, @empty, @empty, @loopback, [0x0, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffff00, 0xff000000, 0xffffffff], 0x80, 0x3800}}, @common=@rt={{0x138}, {0xe422, [0xffffff80, 0x7fff], 0x1, 0x20, 0x1, [@private2, @private0={0xfc, 0x0, '\x00', 0x1f}, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0xf}, @private2={0xfc, 0x2, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x1}, @mcast1, @remote, @mcast2, @dev={0xfe, 0x80, '\x00', 0x1f}, @loopback, @empty, @local], 0xb}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv4=@rand_addr=0x64010100, @icmp_id=0x65, @port=0x4e21}}}, {{@ipv6={@private1, @mcast1, [0xff000000, 0x0, 0x0, 0xffffffff], [0xff, 0x0, 0xffffffff, 0xffffffff], 'team0\x00', 'bridge_slave_1\x00', {}, {}, 0x3, 0xff, 0x6, 0x43}, 0x0, 0x108, 0x150, 0x0, {}, [@common=@inet=@iprange={{0x64}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv6=@ipv4={'\x00', '\xff\xff', @local}, @ipv4=@local, 0x31}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv4=@rand_addr=0x64010100, @ipv6=@private0, @port=0x4e24, @icmp_id=0x65}}}, {{@ipv6={@local, @empty, [0x0, 0xff000000, 0xff, 0xff], [0xff, 0xffffff, 0xff000000, 0xffffff], 'wlan0\x00', 'macvlan1\x00', {}, {0xff}, 0x5e, 0x4, 0x9, 0x10}, 0x0, 0x15c, 0x1a4, 0x0, {}, [@common=@srh1={{0x8c}, {0x11, 0x0, 0x8, 0xca, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @rand_addr=' \x01\x00', [0xff, 0xffffff00], [0xffffff00, 0xffffff00, 0xff], [0xffffffff, 0xff000000, 0xffffff00, 0xffffff00], 0x0, 0x8}}, @common=@inet=@udp={{0x2c}, {[0x4e20, 0x4e24], [0x4e20, 0x4e20], 0x2}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0xc, @ipv4=@broadcast, @ipv4=@multicast2, @port=0x4e24, @port=0x4e23}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x7b4) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x24c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x230, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x6, 0x40, 0x9}, {0x4, 0xe0, 0x4, 0xf366}, {0x1, 0x0, 0x0, 0x6}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x0, 0x7, 0x3f, 0x7fffffff}, {0x3, 0x45, 0xfb}, {0x1, 0x0, 0x1f, 0x4}, {0x0, 0x81, 0x0, 0x3f}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}]}}]}, 0x24c}, 0x1, 0x0, 0x0, 0x24004040}, 0x80) r7 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r7, 0x0, 0x0) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000400)={'c', ' *:* ', 'rm\x00'}, 0x9) inotify_add_watch(r0, 0x0, 0x80) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x367, 0x4) sendmmsg$sock(r0, &(0x7f0000000380)=[{{&(0x7f0000000040)=@l2={0x1f, 0x3, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x1000}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="fd9cb785fd99843dc22b3a7cbc098aeadf37197b2d0244c3bbdf57e684f27922106ce0dab2508e450464e01cd2682d27634b382887adf4d5a89524c54cab3bd41b0e08c8c0762c8bc4264698a762b88d02954f74efa5626cb4530121ce532c3f0fae035d21afab24bb89871cd983ae545db9663315ec2b64fd776f349a5f56e0f0bd27d73593a3e1ceb59fd40ae117fd8bd3785d9c7672c0be8c0ed0d5636c4985309f79f160b73a60bafce34130e191ac68af583a14a1af251cdd49ab78498578d93393bc389b", 0xc7}, {&(0x7f00000001c0)="b76a2f8be55bb819535656d815ada79a0d32ca3d257c44fa87b271045784d7b5914ba0158de19d1e4f40dac8ec535aafd423caf69945915ad6baee98a957d5553899de21ebbfbfeac3b73e798c4151818d", 0x51}, {&(0x7f0000000240)="642bca81abf4db63e6ef4a57d7af75b109b9c40429bca64294d05df07945a2791f7f9b0257cb59a3a28e15702da654382ecac24fdd80df840de1c444537bbe5386ec88ee71e61ead2394671859f4a4f24a9e07c66a26a22d06ed846405e7972d0be5e7a1d1d79528a31f4847430ca5d3b0ac5dfeeabf78474698790a77a052ff32e3fbffae440e41629c3b2f54b39738676b13da11bcdd3b54dab69278bef09bccb38f8ff02381234f17ab8612def2556d57a3d17c590df0c5ce9ca1f17891fc2411b6798fd899214240f4a0e719164a040a03d79f487106449a9c7f6c0c74cc12e53ed9a203bd1aec6a77e6deaa6492aa", 0xf1}], 0x3}}], 0x1, 0x8084) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (async) openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) (async) write$cgroup_devices(r1, &(0x7f0000000400)={'c', ' *:* ', 'rm\x00'}, 0x9) (async) inotify_add_watch(r0, 0x0, 0x80) (async) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x367, 0x4) (async) sendmmsg$sock(r0, &(0x7f0000000380)=[{{&(0x7f0000000040)=@l2={0x1f, 0x3, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x1000}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="fd9cb785fd99843dc22b3a7cbc098aeadf37197b2d0244c3bbdf57e684f27922106ce0dab2508e450464e01cd2682d27634b382887adf4d5a89524c54cab3bd41b0e08c8c0762c8bc4264698a762b88d02954f74efa5626cb4530121ce532c3f0fae035d21afab24bb89871cd983ae545db9663315ec2b64fd776f349a5f56e0f0bd27d73593a3e1ceb59fd40ae117fd8bd3785d9c7672c0be8c0ed0d5636c4985309f79f160b73a60bafce34130e191ac68af583a14a1af251cdd49ab78498578d93393bc389b", 0xc7}, {&(0x7f00000001c0)="b76a2f8be55bb819535656d815ada79a0d32ca3d257c44fa87b271045784d7b5914ba0158de19d1e4f40dac8ec535aafd423caf69945915ad6baee98a957d5553899de21ebbfbfeac3b73e798c4151818d", 0x51}, {&(0x7f0000000240)="642bca81abf4db63e6ef4a57d7af75b109b9c40429bca64294d05df07945a2791f7f9b0257cb59a3a28e15702da654382ecac24fdd80df840de1c444537bbe5386ec88ee71e61ead2394671859f4a4f24a9e07c66a26a22d06ed846405e7972d0be5e7a1d1d79528a31f4847430ca5d3b0ac5dfeeabf78474698790a77a052ff32e3fbffae440e41629c3b2f54b39738676b13da11bcdd3b54dab69278bef09bccb38f8ff02381234f17ab8612def2556d57a3d17c590df0c5ce9ca1f17891fc2411b6798fd899214240f4a0e719164a040a03d79f487106449a9c7f6c0c74cc12e53ed9a203bd1aec6a77e6deaa6492aa", 0xf1}], 0x3}}], 0x1, 0x8084) (async) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000400)={'c', ' *:* ', 'rm\x00'}, 0x9) inotify_add_watch(r0, 0x0, 0x80) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x367, 0x4) sendmmsg$sock(r0, &(0x7f0000000380)=[{{&(0x7f0000000040)=@l2={0x1f, 0x3, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x1000}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="fd9cb785fd99843dc22b3a7cbc098aeadf37197b2d0244c3bbdf57e684f27922106ce0dab2508e450464e01cd2682d27634b382887adf4d5a89524c54cab3bd41b0e08c8c0762c8bc4264698a762b88d02954f74efa5626cb4530121ce532c3f0fae035d21afab24bb89871cd983ae545db9663315ec2b64fd776f349a5f56e0f0bd27d73593a3e1ceb59fd40ae117fd8bd3785d9c7672c0be8c0ed0d5636c4985309f79f160b73a60bafce34130e191ac68af583a14a1af251cdd49ab78498578d93393bc389b", 0xc7}, {&(0x7f00000001c0)="b76a2f8be55bb819535656d815ada79a0d32ca3d257c44fa87b271045784d7b5914ba0158de19d1e4f40dac8ec535aafd423caf69945915ad6baee98a957d5553899de21ebbfbfeac3b73e798c4151818d", 0x51}, {&(0x7f0000000240)="642bca81abf4db63e6ef4a57d7af75b109b9c40429bca64294d05df07945a2791f7f9b0257cb59a3a28e15702da654382ecac24fdd80df840de1c444537bbe5386ec88ee71e61ead2394671859f4a4f24a9e07c66a26a22d06ed846405e7972d0be5e7a1d1d79528a31f4847430ca5d3b0ac5dfeeabf78474698790a77a052ff32e3fbffae440e41629c3b2f54b39738676b13da11bcdd3b54dab69278bef09bccb38f8ff02381234f17ab8612def2556d57a3d17c590df0c5ce9ca1f17891fc2411b6798fd899214240f4a0e719164a040a03d79f487106449a9c7f6c0c74cc12e53ed9a203bd1aec6a77e6deaa6492aa", 0xf1}], 0x3}}], 0x1, 0x8084) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) (async) openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) (async) write$cgroup_devices(r1, &(0x7f0000000400)={'c', ' *:* ', 'rm\x00'}, 0x9) (async) inotify_add_watch(r0, 0x0, 0x80) (async) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x367, 0x4) (async) sendmmsg$sock(r0, &(0x7f0000000380)=[{{&(0x7f0000000040)=@l2={0x1f, 0x3, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x1000}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="fd9cb785fd99843dc22b3a7cbc098aeadf37197b2d0244c3bbdf57e684f27922106ce0dab2508e450464e01cd2682d27634b382887adf4d5a89524c54cab3bd41b0e08c8c0762c8bc4264698a762b88d02954f74efa5626cb4530121ce532c3f0fae035d21afab24bb89871cd983ae545db9663315ec2b64fd776f349a5f56e0f0bd27d73593a3e1ceb59fd40ae117fd8bd3785d9c7672c0be8c0ed0d5636c4985309f79f160b73a60bafce34130e191ac68af583a14a1af251cdd49ab78498578d93393bc389b", 0xc7}, {&(0x7f00000001c0)="b76a2f8be55bb819535656d815ada79a0d32ca3d257c44fa87b271045784d7b5914ba0158de19d1e4f40dac8ec535aafd423caf69945915ad6baee98a957d5553899de21ebbfbfeac3b73e798c4151818d", 0x51}, {&(0x7f0000000240)="642bca81abf4db63e6ef4a57d7af75b109b9c40429bca64294d05df07945a2791f7f9b0257cb59a3a28e15702da654382ecac24fdd80df840de1c444537bbe5386ec88ee71e61ead2394671859f4a4f24a9e07c66a26a22d06ed846405e7972d0be5e7a1d1d79528a31f4847430ca5d3b0ac5dfeeabf78474698790a77a052ff32e3fbffae440e41629c3b2f54b39738676b13da11bcdd3b54dab69278bef09bccb38f8ff02381234f17ab8612def2556d57a3d17c590df0c5ce9ca1f17891fc2411b6798fd899214240f4a0e719164a040a03d79f487106449a9c7f6c0c74cc12e53ed9a203bd1aec6a77e6deaa6492aa", 0xf1}], 0x3}}], 0x1, 0x8084) (async) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) (async) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) (async) r1 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r1, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) (async) r3 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r2, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) (async) r4 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r4, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) (async) r6 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r5, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000001000)=@nat={'nat\x00', 0x1b, 0x5, 0x758, 0xec, 0x0, 0xffffffff, 0xec, 0xec, 0x690, 0x690, 0xffffffff, 0x690, 0x690, 0x5, &(0x7f0000000340), {[{{@uncond, 0x0, 0xa4, 0xec}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x4, @ipv4=@loopback, @ipv4=@multicast1, @icmp_id=0x68, @icmp_id=0x67}}}, {{@uncond, 0x0, 0x268, 0x2b0, 0x0, {}, [@common=@srh1={{0x8c}, {0x29, 0x9, 0x81, 0x3, 0x63, @empty, @empty, @loopback, [0x0, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffff00, 0xff000000, 0xffffffff], 0x80, 0x3800}}, @common=@rt={{0x138}, {0xe422, [0xffffff80, 0x7fff], 0x1, 0x20, 0x1, [@private2, @private0={0xfc, 0x0, '\x00', 0x1f}, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0xf}, @private2={0xfc, 0x2, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x1}, @mcast1, @remote, @mcast2, @dev={0xfe, 0x80, '\x00', 0x1f}, @loopback, @empty, @local], 0xb}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv4=@rand_addr=0x64010100, @icmp_id=0x65, @port=0x4e21}}}, {{@ipv6={@private1, @mcast1, [0xff000000, 0x0, 0x0, 0xffffffff], [0xff, 0x0, 0xffffffff, 0xffffffff], 'team0\x00', 'bridge_slave_1\x00', {}, {}, 0x3, 0xff, 0x6, 0x43}, 0x0, 0x108, 0x150, 0x0, {}, [@common=@inet=@iprange={{0x64}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv6=@ipv4={'\x00', '\xff\xff', @local}, @ipv4=@local, 0x31}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv4=@rand_addr=0x64010100, @ipv6=@private0, @port=0x4e24, @icmp_id=0x65}}}, {{@ipv6={@local, @empty, [0x0, 0xff000000, 0xff, 0xff], [0xff, 0xffffff, 0xff000000, 0xffffff], 'wlan0\x00', 'macvlan1\x00', {}, {0xff}, 0x5e, 0x4, 0x9, 0x10}, 0x0, 0x15c, 0x1a4, 0x0, {}, [@common=@srh1={{0x8c}, {0x11, 0x0, 0x8, 0xca, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @rand_addr=' \x01\x00', [0xff, 0xffffff00], [0xffffff00, 0xffffff00, 0xff], [0xffffffff, 0xff000000, 0xffffff00, 0xffffff00], 0x0, 0x8}}, @common=@inet=@udp={{0x2c}, {[0x4e20, 0x4e24], [0x4e20, 0x4e20], 0x2}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0xc, @ipv4=@broadcast, @ipv4=@multicast2, @port=0x4e24, @port=0x4e23}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x7b4) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x24c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x230, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x6, 0x40, 0x9}, {0x4, 0xe0, 0x4, 0xf366}, {0x1, 0x0, 0x0, 0x6}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x0, 0x7, 0x3f, 0x7fffffff}, {0x3, 0x45, 0xfb}, {0x1, 0x0, 0x1f, 0x4}, {0x0, 0x81, 0x0, 0x3f}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}]}}]}, 0x24c}, 0x1, 0x0, 0x0, 0x24004040}, 0x80) openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) (async) r7 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r7, 0x0, 0x0) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000400)={'c', ' *:* ', 'rm\x00'}, 0x9) inotify_add_watch(r0, 0x0, 0x80) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x367, 0x4) sendmmsg$sock(r0, &(0x7f0000000380)=[{{&(0x7f0000000040)=@l2={0x1f, 0x3, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x1000}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="fd9cb785fd99843dc22b3a7cbc098aeadf37197b2d0244c3bbdf57e684f27922106ce0dab2508e450464e01cd2682d27634b382887adf4d5a89524c54cab3bd41b0e08c8c0762c8bc4264698a762b88d02954f74efa5626cb4530121ce532c3f0fae035d21afab24bb89871cd983ae545db9663315ec2b64fd776f349a5f56e0f0bd27d73593a3e1ceb59fd40ae117fd8bd3785d9c7672c0be8c0ed0d5636c4985309f79f160b73a60bafce34130e191ac68af583a14a1af251cdd49ab78498578d93393bc389b", 0xc7}, {&(0x7f00000001c0)="b76a2f8be55bb819535656d815ada79a0d32ca3d257c44fa87b271045784d7b5914ba0158de19d1e4f40dac8ec535aafd423caf69945915ad6baee98a957d5553899de21ebbfbfeac3b73e798c4151818d", 0x51}, {&(0x7f0000000240)="642bca81abf4db63e6ef4a57d7af75b109b9c40429bca64294d05df07945a2791f7f9b0257cb59a3a28e15702da654382ecac24fdd80df840de1c444537bbe5386ec88ee71e61ead2394671859f4a4f24a9e07c66a26a22d06ed846405e7972d0be5e7a1d1d79528a31f4847430ca5d3b0ac5dfeeabf78474698790a77a052ff32e3fbffae440e41629c3b2f54b39738676b13da11bcdd3b54dab69278bef09bccb38f8ff02381234f17ab8612def2556d57a3d17c590df0c5ce9ca1f17891fc2411b6798fd899214240f4a0e719164a040a03d79f487106449a9c7f6c0c74cc12e53ed9a203bd1aec6a77e6deaa6492aa", 0xf1}], 0x3}}], 0x1, 0x8084) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x0, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [0xffffff00, 0xff, 0xffffffff], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) r1 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r1, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r3 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r2, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r4 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r4, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async, rerun: 64) r6 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r5, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000001000)=@nat={'nat\x00', 0x1b, 0x5, 0x758, 0xec, 0x0, 0xffffffff, 0xec, 0xec, 0x690, 0x690, 0xffffffff, 0x690, 0x690, 0x5, &(0x7f0000000340), {[{{@uncond, 0x0, 0xa4, 0xec}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x4, @ipv4=@loopback, @ipv4=@multicast1, @icmp_id=0x68, @icmp_id=0x67}}}, {{@uncond, 0x0, 0x268, 0x2b0, 0x0, {}, [@common=@srh1={{0x8c}, {0x29, 0x9, 0x81, 0x3, 0x63, @empty, @empty, @loopback, [0x0, 0xffffff00, 0xffffffff], [0xff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffff00, 0xff000000, 0xffffffff], 0x80, 0x3800}}, @common=@rt={{0x138}, {0xe422, [0xffffff80, 0x7fff], 0x1, 0x20, 0x1, [@private2, @private0={0xfc, 0x0, '\x00', 0x1f}, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0xf}, @private2={0xfc, 0x2, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x1}, @mcast1, @remote, @mcast2, @dev={0xfe, 0x80, '\x00', 0x1f}, @loopback, @empty, @local], 0xb}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv4=@broadcast, @ipv4=@rand_addr=0x64010100, @icmp_id=0x65, @port=0x4e21}}}, {{@ipv6={@private1, @mcast1, [0xff000000, 0x0, 0x0, 0xffffffff], [0xff, 0x0, 0xffffffff, 0xffffffff], 'team0\x00', 'bridge_slave_1\x00', {}, {}, 0x3, 0xff, 0x6, 0x43}, 0x0, 0x108, 0x150, 0x0, {}, [@common=@inet=@iprange={{0x64}, {@ipv4=@multicast2, @ipv4=@multicast1, @ipv6=@ipv4={'\x00', '\xff\xff', @local}, @ipv4=@local, 0x31}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv4=@rand_addr=0x64010100, @ipv6=@private0, @port=0x4e24, @icmp_id=0x65}}}, {{@ipv6={@local, @empty, [0x0, 0xff000000, 0xff, 0xff], [0xff, 0xffffff, 0xff000000, 0xffffff], 'wlan0\x00', 'macvlan1\x00', {}, {0xff}, 0x5e, 0x4, 0x9, 0x10}, 0x0, 0x15c, 0x1a4, 0x0, {}, [@common=@srh1={{0x8c}, {0x11, 0x0, 0x8, 0xca, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @rand_addr=' \x01\x00', [0xff, 0xffffff00], [0xffffff00, 0xffffff00, 0xff], [0xffffffff, 0xff000000, 0xffffff00, 0xffffff00], 0x0, 0x8}}, @common=@inet=@udp={{0x2c}, {[0x4e20, 0x4e24], [0x4e20, 0x4e20], 0x2}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0xc, @ipv4=@broadcast, @ipv4=@multicast2, @port=0x4e24, @port=0x4e23}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x7b4) (async, rerun: 32) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000040)={0x24c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8}, {0x230, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x6, 0x40, 0x9}, {0x4, 0xe0, 0x4, 0xf366}, {0x1, 0x0, 0x0, 0x6}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x0, 0x7, 0x3f, 0x7fffffff}, {0x3, 0x45, 0xfb}, {0x1, 0x0, 0x1f, 0x4}, {0x0, 0x81, 0x0, 0x3f}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}]}}]}, 0x24c}, 0x1, 0x0, 0x0, 0x24004040}, 0x80) (rerun: 32) r7 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r7, 0x0, 0x0) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000400)={'c', ' *:* ', 'rm\x00'}, 0x9) inotify_add_watch(r0, 0x0, 0x80) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x367, 0x4) sendmmsg$sock(r0, &(0x7f0000000380)=[{{&(0x7f0000000040)=@l2={0x1f, 0x3, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x1000}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="fd9cb785fd99843dc22b3a7cbc098aeadf37197b2d0244c3bbdf57e684f27922106ce0dab2508e450464e01cd2682d27634b382887adf4d5a89524c54cab3bd41b0e08c8c0762c8bc4264698a762b88d02954f74efa5626cb4530121ce532c3f0fae035d21afab24bb89871cd983ae545db9663315ec2b64fd776f349a5f56e0f0bd27d73593a3e1ceb59fd40ae117fd8bd3785d9c7672c0be8c0ed0d5636c4985309f79f160b73a60bafce34130e191ac68af583a14a1af251cdd49ab78498578d93393bc389b", 0xc7}, {&(0x7f00000001c0)="b76a2f8be55bb819535656d815ada79a0d32ca3d257c44fa87b271045784d7b5914ba0158de19d1e4f40dac8ec535aafd423caf69945915ad6baee98a957d5553899de21ebbfbfeac3b73e798c4151818d", 0x51}, {&(0x7f0000000240)="642bca81abf4db63e6ef4a57d7af75b109b9c40429bca64294d05df07945a2791f7f9b0257cb59a3a28e15702da654382ecac24fdd80df840de1c444537bbe5386ec88ee71e61ead2394671859f4a4f24a9e07c66a26a22d06ed846405e7972d0be5e7a1d1d79528a31f4847430ca5d3b0ac5dfeeabf78474698790a77a052ff32e3fbffae440e41629c3b2f54b39738676b13da11bcdd3b54dab69278bef09bccb38f8ff02381234f17ab8612def2556d57a3d17c590df0c5ce9ca1f17891fc2411b6798fd899214240f4a0e719164a040a03d79f487106449a9c7f6c0c74cc12e53ed9a203bd1aec6a77e6deaa6492aa", 0xf1}], 0x3}}], 0x1, 0x8084) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x0, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) [ 193.625217][ T1339] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.628218][ T1339] ieee802154 phy1 wpan1: encryption failed: -22 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [0xffffff00, 0xff], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000400)={'c', ' *:* ', 'rm\x00'}, 0x9) inotify_add_watch(r0, 0x0, 0x80) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x367, 0x4) sendmmsg$sock(r0, &(0x7f0000000380)=[{{&(0x7f0000000040)=@l2={0x1f, 0x3, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x1000}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="fd9cb785fd99843dc22b3a7cbc098aeadf37197b2d0244c3bbdf57e684f27922106ce0dab2508e450464e01cd2682d27634b382887adf4d5a89524c54cab3bd41b0e08c8c0762c8bc4264698a762b88d02954f74efa5626cb4530121ce532c3f0fae035d21afab24bb89871cd983ae545db9663315ec2b64fd776f349a5f56e0f0bd27d73593a3e1ceb59fd40ae117fd8bd3785d9c7672c0be8c0ed0d5636c4985309f79f160b73a60bafce34130e191ac68af583a14a1af251cdd49ab78498578d93393bc389b", 0xc7}, {&(0x7f00000001c0)="b76a2f8be55bb819535656d815ada79a0d32ca3d257c44fa87b271045784d7b5914ba0158de19d1e4f40dac8ec535aafd423caf69945915ad6baee98a957d5553899de21ebbfbfeac3b73e798c4151818d", 0x51}, {&(0x7f0000000240)="642bca81abf4db63e6ef4a57d7af75b109b9c40429bca64294d05df07945a2791f7f9b0257cb59a3a28e15702da654382ecac24fdd80df840de1c444537bbe5386ec88ee71e61ead2394671859f4a4f24a9e07c66a26a22d06ed846405e7972d0be5e7a1d1d79528a31f4847430ca5d3b0ac5dfeeabf78474698790a77a052ff32e3fbffae440e41629c3b2f54b39738676b13da11bcdd3b54dab69278bef09bccb38f8ff02381234f17ab8612def2556d57a3d17c590df0c5ce9ca1f17891fc2411b6798fd899214240f4a0e719164a040a03d79f487106449a9c7f6c0c74cc12e53ed9a203bd1aec6a77e6deaa6492aa", 0xf1}], 0x3}}], 0x1, 0x8084) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [0xffffff00], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x0, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000400)={'c', ' *:* ', 'rm\x00'}, 0x9) inotify_add_watch(r0, 0x0, 0x80) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x367, 0x4) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000400)={'c', ' *:* ', 'rm\x00'}, 0x9) inotify_add_watch(r0, 0x0, 0x80) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x0, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r7 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r7, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20008080}, 0x50) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00', {}, {}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000400)={'c', ' *:* ', 'rm\x00'}, 0x9) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x0, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x0, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00', {}, {}, 0x0, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) (async) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) (async) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) (async) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) (async) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) (async) r7 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r7, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20008080}, 0x50) 16:06:57 executing program 1: openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00', {}, {}, 0x0, 0x0, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x0, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) (async, rerun: 32) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) (async, rerun: 32) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async, rerun: 64) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) (async, rerun: 64) r7 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r7, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20008080}, 0x50) 16:06:57 executing program 1: openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00', {}, {}, 0x0, 0x0, 0x0, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x0, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x10602, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x10001, 0x0, 0xbd, 0x2, r1, 0x4, '\x00', 0x0, r0, 0x4, 0x4, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) 16:06:57 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:57 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, 0x0, 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x0, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4ac, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x1dc, 0x200, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x508) 16:06:58 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x10602, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x10001, 0x0, 0xbd, 0x2, r1, 0x4, '\x00', 0x0, r0, 0x4, 0x4, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) openat$sr(0xffffff9c, &(0x7f0000003740), 0x10602, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x10001, 0x0, 0xbd, 0x2, r1, 0x4, '\x00', 0x0, r0, 0x4, 0x4, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) (async) 16:06:58 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, 0x0, 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x374, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3d0) 16:06:58 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x10602, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x10001, 0x0, 0xbd, 0x2, r1, 0x4, '\x00', 0x0, r0, 0x4, 0x4, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) openat$sr(0xffffff9c, &(0x7f0000003740), 0x10602, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x10001, 0x0, 0xbd, 0x2, r1, 0x4, '\x00', 0x0, r0, 0x4, 0x4, 0x3}, 0x48) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) (async) 16:06:58 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, 0x0, 0x0, 0x0) openat$cgroup_devices(r0, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x374, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3d0) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x348, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3a4) 16:06:58 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000000000), 0x680100, 0x0) openat$kvm(0xffffff9c, &(0x7f0000000040), 0x4000, 0x0) r1 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000080), 0x404080, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001680)=ANY=[@ANYBLOB="8c1102002866dd14dd4d594e3acc56f8aef44387094df9af10fcff5016be30dbda7916c1cad0952908e3b28a5e7eebd17f2d10c092f2e7b978d1606c4986a6f394ef6574c683974126ce24d22bf9edb0b3f33d0ba073e1ccddf5658c18d1197816fa62599f8988012ab4a16f9507630bd981cc350b00ec6f1a704c0c8db78e6cfbce2e35859980f00ee316617e94ad8a1d192599950a7123b302ab53d3bacd2810ed2b7b32de27f4196976543ed8cc1f60c632c9ada0a3366647f959c0bf423e50f729b879027fb89a1e1c8da7676980cfd076f8419c4784ee5eaf11eac976054c17ac09d34a0b", @ANYRES16=0x0, @ANYBLOB="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"], 0x118c}, 0x1, 0x0, 0x0, 0x8884}, 0x4000000) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x8c4) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000001440)={&(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0], 0x3, 0x8, 0x1, 0x1}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000001580)={&(0x7f0000001480)=[0x0], &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001500)=[0x0, 0x0], &(0x7f0000001540)=[0x0], 0x1, 0x6, 0x2, 0x1}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) r7 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x400, 0x0) ioctl$CDROMPLAYTRKIND(r7, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) ioctl$DRM_IOCTL_MODE_SETPLANE(r7, 0xc03064b7, &(0x7f0000000480)={0x0, r6, r5, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000001600)={&(0x7f00000015c0)=[r3, 0x0, r4, 0x0, 0x0], 0x5, r6, 0x0, 0x0, 0x1, 0xcd3, 0x296, {0x6, 0x6, 0x6, 0x9db, 0x8b7, 0x0, 0x5261, 0x2, 0x800, 0x6, 0x0, 0x401, 0x100, 0x9, "5a5395d416e84e99c71dfba372aa247e5815db48088db16ae26736b91b97a141"}}) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x324, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa4, 0xcc}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x380) 16:06:58 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:58 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000000000), 0x680100, 0x0) openat$kvm(0xffffff9c, &(0x7f0000000040), 0x4000, 0x0) (async) r1 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000080), 0x404080, 0x0) (async) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001680)=ANY=[@ANYBLOB="8c1102002866dd14dd4d594e3acc56f8aef44387094df9af10fcff5016be30dbda7916c1cad0952908e3b28a5e7eebd17f2d10c092f2e7b978d1606c4986a6f394ef6574c683974126ce24d22bf9edb0b3f33d0ba073e1ccddf5658c18d1197816fa62599f8988012ab4a16f9507630bd981cc350b00ec6f1a704c0c8db78e6cfbce2e35859980f00ee316617e94ad8a1d192599950a7123b302ab53d3bacd2810ed2b7b32de27f4196976543ed8cc1f60c632c9ada0a3366647f959c0bf423e50f729b879027fb89a1e1c8da7676980cfd076f8419c4784ee5eaf11eac976054c17ac09d34a0b", @ANYRES16=0x0, @ANYBLOB="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"], 0x118c}, 0x1, 0x0, 0x0, 0x8884}, 0x4000000) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x8c4) (async) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) (async) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000001440)={&(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0], 0x3, 0x8, 0x1, 0x1}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000001580)={&(0x7f0000001480)=[0x0], &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001500)=[0x0, 0x0], &(0x7f0000001540)=[0x0], 0x1, 0x6, 0x2, 0x1}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) (async) r7 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x400, 0x0) ioctl$CDROMPLAYTRKIND(r7, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) (async) ioctl$DRM_IOCTL_MODE_SETPLANE(r7, 0xc03064b7, &(0x7f0000000480)={0x0, r6, r5, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) (async) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000001600)={&(0x7f00000015c0)=[r3, 0x0, r4, 0x0, 0x0], 0x5, r6, 0x0, 0x0, 0x1, 0xcd3, 0x296, {0x6, 0x6, 0x6, 0x9db, 0x8b7, 0x0, 0x5261, 0x2, 0x800, 0x6, 0x0, 0x401, 0x100, 0x9, "5a5395d416e84e99c71dfba372aa247e5815db48088db16ae26736b91b97a141"}}) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4ac, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x1dc, 0x200, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x508) 16:06:58 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x324, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa4, 0xcc}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x380) 16:06:58 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000000000), 0x680100, 0x0) openat$kvm(0xffffff9c, &(0x7f0000000040), 0x4000, 0x0) (async) r1 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000080), 0x404080, 0x0) (async) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000001400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001680)=ANY=[@ANYBLOB="8c1102002866dd14dd4d594e3acc56f8aef44387094df9af10fcff5016be30dbda7916c1cad0952908e3b28a5e7eebd17f2d10c092f2e7b978d1606c4986a6f394ef6574c683974126ce24d22bf9edb0b3f33d0ba073e1ccddf5658c18d1197816fa62599f8988012ab4a16f9507630bd981cc350b00ec6f1a704c0c8db78e6cfbce2e35859980f00ee316617e94ad8a1d192599950a7123b302ab53d3bacd2810ed2b7b32de27f4196976543ed8cc1f60c632c9ada0a3366647f959c0bf423e50f729b879027fb89a1e1c8da7676980cfd076f8419c4784ee5eaf11eac976054c17ac09d34a0b", @ANYRES16=0x0, @ANYBLOB="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"], 0x118c}, 0x1, 0x0, 0x0, 0x8884}, 0x4000000) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x8c4) (async) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) (async) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000001440)={&(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0], 0x3, 0x8, 0x1, 0x1}) (async) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000001580)={&(0x7f0000001480)=[0x0], &(0x7f00000014c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001500)=[0x0, 0x0], &(0x7f0000001540)=[0x0], 0x1, 0x6, 0x2, 0x1}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x6, 0xa, 0x7}) r7 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x400, 0x0) ioctl$CDROMPLAYTRKIND(r7, 0x5304, &(0x7f00000002c0)={0xa4, 0x3, 0x3f, 0x9}) ioctl$DRM_IOCTL_MODE_SETPLANE(r7, 0xc03064b7, &(0x7f0000000480)={0x0, r6, r5, 0xfffff498, 0x0, 0x8, 0x6, 0x1f, 0x9, 0x2, 0x174c, 0x7f}) (async) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000001600)={&(0x7f00000015c0)=[r3, 0x0, r4, 0x0, 0x0], 0x5, r6, 0x0, 0x0, 0x1, 0xcd3, 0x296, {0x6, 0x6, 0x6, 0x9db, 0x8b7, 0x0, 0x5261, 0x2, 0x800, 0x6, 0x0, 0x401, 0x100, 0x9, "5a5395d416e84e99c71dfba372aa247e5815db48088db16ae26736b91b97a141"}}) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4ac, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x1dc, 0x200, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x508) 16:06:58 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$cgroup_devices(r0, 0x0, 0x2, 0x0) 16:06:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x324, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa4, 0xcc}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x0, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x380) 16:06:58 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) r1 = openat$sr(0xffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc01c7c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) 16:06:58 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$cgroup_devices(r0, 0x0, 0x2, 0x0) 16:06:58 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x324, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa4, 0xcc}, @common=@unspec=@NFQUEUE3={0x28}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x380) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4ac, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x1dc, 0x200, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x508) 16:06:58 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc01c7c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) 16:06:58 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$cgroup_devices(r0, 0x0, 0x2, 0x0) 16:06:58 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x10602, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x10001, 0x0, 0xbd, 0x2, r1, 0x4, '\x00', 0x0, r0, 0x4, 0x4, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) 16:06:58 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) (async) r1 = openat$sr(0xffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r1, 0xc01c7c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000040), &(0x7f0000000080)}) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x0, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x10602, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x10001, 0x0, 0xbd, 0x2, r1, 0x4, '\x00', 0x0, r0, 0x4, 0x4, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) 16:06:58 executing program 1: openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:58 executing program 1: openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:58 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x10602, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x10001, 0x0, 0xbd, 0x2, r1, 0x4, '\x00', 0x0, r0, 0x4, 0x4, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x0, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r4 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r3, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x974, 0x76ea, 0x7, 0x800, r1, 0x7, '\x00', r3, r0, 0x4, 0x3, 0x2}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 16:06:58 executing program 1: openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) 16:06:58 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x10602, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x10001, 0x0, 0xbd, 0x2, r1, 0x4, '\x00', 0x0, r0, 0x4, 0x4, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000), 0x80) 16:06:58 executing program 1: openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:06:58 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x10602, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x10001, 0x0, 0xbd, 0x2, r1, 0x4, '\x00', 0x0, r0, 0x4, 0x4, 0x3}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x0, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x10602, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1d, 0x10001, 0x0, 0xbd, 0x2, r1, 0x4, '\x00', 0x0, r0, 0x4, 0x4, 0x3}, 0x48) 16:06:58 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) (async, rerun: 32) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) (rerun: 32) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async, rerun: 32) r4 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) (rerun: 32) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r3, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x974, 0x76ea, 0x7, 0x800, r1, 0x7, '\x00', r3, r0, 0x4, 0x3, 0x2}, 0x48) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 16:06:58 executing program 1: openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:06:58 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x10602, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2}, 0x48) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x0, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 1: openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x81c, 0xc73, 0x7, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) 16:06:58 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r7 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r7, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20008080}, 0x50) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x0, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r4 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r3, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x974, 0x76ea, 0x7, 0x800, r1, 0x7, '\x00', r3, r0, 0x4, 0x3, 0x2}, 0x48) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) (async) openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) (async) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) (async) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r3, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x974, 0x76ea, 0x7, 0x800, r1, 0x7, '\x00', r3, r0, 0x4, 0x3, 0x2}, 0x48) (async) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) (async) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x0, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r7 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r7, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20008080}, 0x50) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 16:06:58 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x7fff, 0x80000) r1 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r1, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r3 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r2, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r4 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r4, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r6 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r5, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)={0x32c, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r2}}}]}}, {{0x8}, {0x254, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x40}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}]}, 0x32c}, 0x1, 0x0, 0x0, 0x801}, 0x44) r7 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r7, 0x0, 0x0) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0x0, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r7 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r7, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20008080}, 0x50) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x81c, 0xc73, 0x7, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) 16:06:58 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x7fff, 0x80000) (async) r1 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r1, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async, rerun: 32) r3 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) (rerun: 32) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r2, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) r4 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r4, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async) r6 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r5, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async, rerun: 32) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)={0x32c, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r2}}}]}}, {{0x8}, {0x254, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x40}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}]}, 0x32c}, 0x1, 0x0, 0x0, 0x801}, 0x44) (async, rerun: 32) r7 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r7, 0x0, 0x0) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0xc73, 0x7, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0x0, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0x0, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) r6 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r6, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) 16:06:58 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x7fff, 0x80000) (async) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x7fff, 0x80000) r1 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r1, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r1, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r3 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r2, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r4 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) (async) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r4, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r6 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r5, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r5, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000080)={0x32c, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r2}}}]}}, {{0x8}, {0x254, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x40}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}]}, 0x32c}, 0x1, 0x0, 0x0, 0x801}, 0x44) r7 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r7, 0x0, 0x0) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x0, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x48) 16:06:58 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 16:06:58 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) r6 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r6, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x0, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) 16:06:58 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) r6 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x0, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) 16:06:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200), 0x48) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x0, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r7 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r7, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20008080}, 0x50) 16:06:58 executing program 0: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000f00)={0x3e4, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_WANTED={0x2a0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc6, 0x5, "09a7aaabe88b1b9a0650aa9d3e7769f70a013b68bb30c6f84885b9d98ba89929d6f4305125aa1120f3abd5da43e2e856b7a74bc8da7a549826bfc1ac74a07c67bd8695291a34363d5b96b64112b23ca2dbde243eb5cf80efba2e324be80e1df78f95687ff9f700c5f8bf4a77cafbcced52808a3d4407b72fa7bc3ad135ac0f38a7c006e2005a7645a488c956b9c624148c1a721935664ed0509a93ea898da4863ba2e76fbcd1e37810835f4afb0dae1849a2dac2c3a99a16f8de3ff2e41150ae9fa0"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x9c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x134, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',\xb1:\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\\'^&%$^:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff800}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '+-\x8c}\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/$-+^]:*@\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7e8}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x118, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10c, 0x3, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$#.\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8fd2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\'@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ca}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2d73e117}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffffd}]}]}, 0x3e4}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) r1 = openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x5c481237a5701e7e, 0x0) ioctl$CDROMREADMODE1(r1, 0x530d, &(0x7f0000000040)={0x7, 0x9, 0x8, 0x81, 0x6, 0x5}) inotify_add_watch(r0, 0x0, 0x80) 16:06:58 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) r6 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:58 executing program 0: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000f00)={0x3e4, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_WANTED={0x2a0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc6, 0x5, "09a7aaabe88b1b9a0650aa9d3e7769f70a013b68bb30c6f84885b9d98ba89929d6f4305125aa1120f3abd5da43e2e856b7a74bc8da7a549826bfc1ac74a07c67bd8695291a34363d5b96b64112b23ca2dbde243eb5cf80efba2e324be80e1df78f95687ff9f700c5f8bf4a77cafbcced52808a3d4407b72fa7bc3ad135ac0f38a7c006e2005a7645a488c956b9c624148c1a721935664ed0509a93ea898da4863ba2e76fbcd1e37810835f4afb0dae1849a2dac2c3a99a16f8de3ff2e41150ae9fa0"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x9c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x134, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',\xb1:\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\\'^&%$^:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff800}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '+-\x8c}\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/$-+^]:*@\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7e8}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x118, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10c, 0x3, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$#.\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8fd2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\'@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ca}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2d73e117}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffffd}]}]}, 0x3e4}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) r1 = openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x5c481237a5701e7e, 0x0) ioctl$CDROMREADMODE1(r1, 0x530d, &(0x7f0000000040)={0x7, 0x9, 0x8, 0x81, 0x6, 0x5}) inotify_add_watch(r0, 0x0, 0x80) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x0, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:58 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r7 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r7, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20008080}, 0x50) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x0, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 0: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000f00)={0x3e4, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_WANTED={0x2a0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc6, 0x5, "09a7aaabe88b1b9a0650aa9d3e7769f70a013b68bb30c6f84885b9d98ba89929d6f4305125aa1120f3abd5da43e2e856b7a74bc8da7a549826bfc1ac74a07c67bd8695291a34363d5b96b64112b23ca2dbde243eb5cf80efba2e324be80e1df78f95687ff9f700c5f8bf4a77cafbcced52808a3d4407b72fa7bc3ad135ac0f38a7c006e2005a7645a488c956b9c624148c1a721935664ed0509a93ea898da4863ba2e76fbcd1e37810835f4afb0dae1849a2dac2c3a99a16f8de3ff2e41150ae9fa0"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x9c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x134, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',\xb1:\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\\'^&%$^:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff800}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '+-\x8c}\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/$-+^]:*@\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7e8}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x118, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10c, 0x3, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$#.\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8fd2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\'@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ca}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2d73e117}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffffd}]}]}, 0x3e4}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) r1 = openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x5c481237a5701e7e, 0x0) ioctl$CDROMREADMODE1(r1, 0x530d, &(0x7f0000000040)={0x7, 0x9, 0x8, 0x81, 0x6, 0x5}) inotify_add_watch(r0, 0x0, 0x80) 16:06:58 executing program 0: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000f00)={0x3e4, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_WANTED={0x2a0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc6, 0x5, "09a7aaabe88b1b9a0650aa9d3e7769f70a013b68bb30c6f84885b9d98ba89929d6f4305125aa1120f3abd5da43e2e856b7a74bc8da7a549826bfc1ac74a07c67bd8695291a34363d5b96b64112b23ca2dbde243eb5cf80efba2e324be80e1df78f95687ff9f700c5f8bf4a77cafbcced52808a3d4407b72fa7bc3ad135ac0f38a7c006e2005a7645a488c956b9c624148c1a721935664ed0509a93ea898da4863ba2e76fbcd1e37810835f4afb0dae1849a2dac2c3a99a16f8de3ff2e41150ae9fa0"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x9c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x134, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',\xb1:\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\\'^&%$^:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff800}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '+-\x8c}\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/$-+^]:*@\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7e8}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x118, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10c, 0x3, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$#.\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8fd2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\'@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ca}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2d73e117}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffffd}]}]}, 0x3e4}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) r1 = openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x5c481237a5701e7e, 0x0) ioctl$CDROMREADMODE1(r1, 0x530d, &(0x7f0000000040)={0x7, 0x9, 0x8, 0x81, 0x6, 0x5}) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x0, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 0: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000f00)={0x3e4, 0x0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_WANTED={0x2a0, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xc6, 0x5, "09a7aaabe88b1b9a0650aa9d3e7769f70a013b68bb30c6f84885b9d98ba89929d6f4305125aa1120f3abd5da43e2e856b7a74bc8da7a549826bfc1ac74a07c67bd8695291a34363d5b96b64112b23ca2dbde243eb5cf80efba2e324be80e1df78f95687ff9f700c5f8bf4a77cafbcced52808a3d4407b72fa7bc3ad135ac0f38a7c006e2005a7645a488c956b9c624148c1a721935664ed0509a93ea898da4863ba2e76fbcd1e37810835f4afb0dae1849a2dac2c3a99a16f8de3ff2e41150ae9fa0"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x9c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ':\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x134, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ',\xb1:\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\\'^&%$^:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff800}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '+-\x8c}\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/$-+^]:*@\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1000}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7e8}]}]}]}, @ETHTOOL_A_FEATURES_WANTED={0x118, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10c, 0x3, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '$#.\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '/dev/cdrom\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8fd2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\'@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '/dev/dlm-monitor\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ca}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2d73e117}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffffd}]}]}, 0x3e4}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x5c481237a5701e7e, 0x0) 16:06:58 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:58 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r7 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r7, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20008080}, 0x50) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x0, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 0: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x5c481237a5701e7e, 0x0) 16:06:58 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x0, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:58 executing program 0: openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x5c481237a5701e7e, 0x0) 16:06:58 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) r6 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r6, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) 16:06:58 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 0: openat$cdrom(0xffffff9c, 0x0, 0x5c481237a5701e7e, 0x0) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x0, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 0: openat$cdrom(0xffffff9c, 0x0, 0x5c481237a5701e7e, 0x0) 16:06:59 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) r6 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r6, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) 16:06:59 executing program 0: openat$cdrom(0xffffff9c, 0x0, 0x5c481237a5701e7e, 0x0) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x0, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 0: openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:06:59 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) r6 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x0, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 0: openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:06:59 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 195.033694][T32354] xt_check_table_hooks: 198 callbacks suppressed [ 195.033893][T32354] x_tables: duplicate underflow at hook 2 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) r6 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 0: openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x0, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) r6 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) [ 195.092150][T32362] x_tables: duplicate underflow at hook 2 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 195.142200][T32370] x_tables: duplicate underflow at hook 2 16:06:59 executing program 0: openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 0: openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 195.191167][T32378] x_tables: duplicate underflow at hook 2 16:06:59 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 0: openat$cdrom(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 16:06:59 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 195.240066][T32386] x_tables: duplicate underflow at hook 2 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4c4, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x1f4, 0x218, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x520) 16:06:59 executing program 0: openat$cdrom(0xffffff9c, 0x0, 0x0, 0x0) 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) 16:06:59 executing program 0: openat$cdrom(0xffffff9c, 0x0, 0x0, 0x0) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4c4, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x1f4, 0x218, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x520) 16:06:59 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 0: openat$cdrom(0xffffff9c, 0x0, 0x0, 0x0) 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) 16:06:59 executing program 1: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x4000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4c4, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x1f4, 0x218, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x520) 16:06:59 executing program 0: openat$cdrom(0xffffff9c, 0x0, 0x0, 0x0) 16:06:59 executing program 1: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4c4, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x1f4, 0x218, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x520) [ 195.406858][T32419] x_tables: duplicate underflow at hook 2 16:06:59 executing program 1: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4c4, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x1f4, 0x218, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x520) 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) 16:06:59 executing program 1: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 195.451515][T32427] x_tables: duplicate underflow at hook 2 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x4c4, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x1f4, 0x218, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x520) 16:06:59 executing program 1: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 195.492445][T32434] x_tables: duplicate underflow at hook 2 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) socket$inet6_udplite(0xa, 0x2, 0x88) [ 195.528021][T32442] x_tables: duplicate underflow at hook 2 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 16:06:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) [ 195.568427][T32448] x_tables: duplicate underflow at hook 2 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) 16:06:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x0, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) 16:06:59 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x0, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 2: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x4000000) 16:06:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) 16:06:59 executing program 2: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 16:06:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x0, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 2: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, 0x0, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, 0x0, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 2: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) 16:06:59 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, 0x0, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 2: socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) 16:06:59 executing program 0: syz_open_dev$vcsa(0x0, 0x3, 0x40) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 2: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)) 16:06:59 executing program 0: syz_open_dev$vcsa(0x0, 0x3, 0x40) 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:06:59 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:06:59 executing program 0: syz_open_dev$vcsa(0x0, 0x3, 0x40) 16:06:59 executing program 2: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)) 16:06:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x40) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 2: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: socketpair(0x10, 0x0, 0x0, &(0x7f0000000000)) 16:07:00 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: socketpair(0x10, 0x0, 0x0, 0x0) 16:07:00 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) 16:07:00 executing program 2: socketpair(0x10, 0x0, 0x0, 0x0) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, 0x0, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: socketpair(0x10, 0x0, 0x0, 0x0) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, 0x0, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, 0x0, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 16:07:00 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) socketpair(0x10, 0x5, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, 0x0, 0x4000000) ioctl$CDROMEJECT_SW(r0, 0x530f, 0x0) r2 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r2, 0xc03064b7, 0x0) ioctl$CDROMPLAYTRKIND(r2, 0x5304, &(0x7f0000000800)) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r3, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffffffffffff9500000000000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edffffff"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x0, 0x4, 0x0, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x0, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000edff"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROM_SEND_PACKET(r1, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@bridge_dellink={0x28, 0x11, 0x2, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x40}, [@IFLA_MASTER={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000000) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x8) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 16:07:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x0, 0x4, 0x0, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROM_SEND_PACKET(r1, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@bridge_dellink={0x28, 0x11, 0x2, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x40}, [@IFLA_MASTER={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000000) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x8) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 0: sysfs$3(0x3) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x480) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5d0, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x62c) 16:07:00 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r1 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r1, 0xc03064b7, 0x0) ioctl$CDROM_SEND_PACKET(r1, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) ioctl$CDROMPLAYTRKIND(r1, 0x5304, &(0x7f0000000800)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@bridge_dellink={0x28, 0x11, 0x2, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x40}, [@IFLA_MASTER={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000000) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x8) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, 0x0, 0x0) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5d0, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x62c) 16:07:00 executing program 0: sysfs$3(0x3) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x480) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000ed"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@bridge_dellink={0x28, 0x11, 0x2, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x40}, [@IFLA_MASTER={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000000) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x8) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5d0, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x62c) 16:07:00 executing program 0: sysfs$3(0x3) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x480) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@bridge_dellink={0x28, 0x11, 0x2, 0x70bd26, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x40}, [@IFLA_MASTER={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000000) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 0: sysfs$3(0x3) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x480) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 0: sysfs$3(0x3) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x480) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:00 executing program 2: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000800)) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 0: sysfs$3(0x3) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x480) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:00 executing program 2: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000ed"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 0: sysfs$3(0x3) openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000ed"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 0: sysfs$3(0x3) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000ed"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 2: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x0, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 2: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=ANY=[@ANYBLOB="18000000ff0000000000000002000000ed"], &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x0, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:00 executing program 2: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:00 executing program 1: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x0, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 2: openat$sr(0xffffff9c, &(0x7f0000003740), 0x200000, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:00 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:00 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:00 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:00 executing program 1: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 2: r0 = openat$sr(0xffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x8000) 16:07:00 executing program 1: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 2: r0 = openat$sr(0xffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x8000) 16:07:00 executing program 1: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:00 executing program 2: r0 = openat$sr(0xffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 1: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [0x7, 0x1], 0x2, 0x1, 0x5, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6, 0x8, 0x80}, {0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x8000) 16:07:01 executing program 2: openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x0, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 1: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 2: openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x0, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 1: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [], [], 'bond0\x00', 'pim6reg1\x00'}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00'}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:01 executing program 2: openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9e016138bee3830c0dbcd30640b1a95f7384bed2acc220b65ce1ccaf8a36244f27d0e14a36f7ed0cc357537eccdc6f547f5cd", 0x64, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000040)) inotify_add_watch(r0, 0x0, 0x80) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x0, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, 0x0) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, 0x0) 16:07:01 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000040)) inotify_add_watch(r0, 0x0, 0x80) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0x0, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, 0x0) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0x0, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r1 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000040)) inotify_add_watch(r0, 0x0, 0x80) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", 0x0, 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x0, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0x0, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", 0x0, 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0x0, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:01 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4040094}, 0x8000) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x0, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", 0x0, 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14}, 0x14}}, 0x8000) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x0, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14}, 0x14}}, 0x0) 16:07:01 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x0, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 0: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 0: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9", 0x32, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 0: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9", 0x32, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 1: r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 0: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5d8, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x634) 16:07:01 executing program 1: r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5d8, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x634) 16:07:01 executing program 1: r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 0: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850", 0x19, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5d8, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x634) 16:07:01 executing program 1: openat$dlm_monitor(0xffffff9c, 0x0, 0x0, 0x0) r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x0, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 0: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x0, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 1: openat$dlm_monitor(0xffffff9c, 0x0, 0x0, 0x0) r0 = openat$nci(0xffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 0: r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x0, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 1: openat$dlm_monitor(0xffffff9c, 0x0, 0x0, 0x0) r0 = openat$nci(0xffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade40", 0xd, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 0: r0 = openat$nci(0xffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)='4', 0x1, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 1: openat$dlm_monitor(0xffffff9c, 0x0, 0x0, 0x0) r0 = openat$nci(0xffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 0: r0 = openat$nci(0xffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 1: openat$dlm_monitor(0xffffff9c, 0x0, 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 0: r0 = openat$nci(0xffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 0: openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 1: openat$dlm_monitor(0xffffff9c, 0x0, 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:01 executing program 0: openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 16:07:01 executing program 1: openat$dlm_monitor(0xffffff9c, 0x0, 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) 16:07:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:01 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)='4', 0x1, 0x0, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 0: openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) 16:07:02 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)='4', 0x1, 0x0, 0x0, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 1: openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 16:07:02 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:02 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)='4', 0x1, 0x0, 0x0, 0x0, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 0: openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) 16:07:02 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:02 executing program 1: openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 16:07:02 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)='4', 0x1, 0x0, 0x0, 0x0, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 0: openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) 16:07:02 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)='4', 0x1, 0x0, 0x0, 0x0, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x0, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:02 executing program 1: openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 16:07:02 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)='4', 0x1, 0x0, 0x0, 0x2, 0x0, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 0: openat$dlm_monitor(0xffffff9c, 0x0, 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 16:07:02 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x0, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:02 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)='4', 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, &(0x7f00000000c0)}) 16:07:02 executing program 1: openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:07:02 executing program 0: openat$dlm_monitor(0xffffff9c, 0x0, 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 16:07:02 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x0, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:02 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)='4', 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 16:07:02 executing program 1: openat$nci(0xffffff9c, 0x0, 0x2, 0x0) 16:07:02 executing program 0: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x0, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001, 0x3}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:02 executing program 1: openat$nci(0xffffff9c, 0x0, 0x2, 0x0) 16:07:02 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:02 executing program 2: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:07:02 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850", 0x19, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:02 executing program 1: openat$nci(0xffffff9c, 0x0, 0x2, 0x0) 16:07:02 executing program 2: r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:02 executing program 1: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:07:02 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850", 0x19, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:02 executing program 2: r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:02 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x40) r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r0, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000003800)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r2 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r1, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x5fc, 0xffffffff, 0x0, 0x11c, 0x46c, 0xffffffff, 0xffffffff, 0x534, 0x534, 0x534, 0xffffffff, 0x4, &(0x7f0000000300), {[{{@uncond, 0x0, 0xf4, 0x11c, 0x0, {}, [@common=@hl={{0x24}, {0x3, 0x9}}, @common=@inet=@tcp={{0x2c}, {[0x4e22, 0x4e24], [0x4e22, 0x4e20], 0xfe, 0x10, 0x0, 0x4}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x3f, 0x8001}}}, {{@ipv6={@private1, @loopback, [0xda7f5effe500ddb9, 0xff000000, 0xff, 0xffffffff], [0xffffff00, 0xff, 0xffffffff, 0xff000000], 'bond0\x00', 'pim6reg1\x00', {}, {0xff}, 0x3b, 0x9, 0x2, 0x15}, 0x0, 0x32c, 0x350, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @mcast2, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00', @private0, @remote, @dev={0xfe, 0x80, '\x00', 0x1b}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, @mcast2], 0x1}}, @common=@inet=@hashlimit2={{0x150}, {'veth0_vlan\x00', {0x8, 0x9, 0xc, 0x9, 0x10000, 0x4, 0x6}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x400}}}, {{@uncond, 0x0, 0xa4, 0xc8}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x658) 16:07:02 executing program 0: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850", 0x19, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 1: r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:02 executing program 0: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850", 0x19, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 3: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:07:02 executing program 2: r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:02 executing program 1: r0 = openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000040)) 16:07:02 executing program 0: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850", 0x19, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 2: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850329c7849b349fa2e84c6c19edf1ebfda40e004dea01a74a0e9", 0x32, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 0: ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850", 0x19, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 3: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:07:02 executing program 2: openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) openat$nci(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) 16:07:02 executing program 1: r0 = openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000), 0x0, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) 16:07:02 executing program 0: r0 = openat$sr(0xffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850", 0x19, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) [ 198.504335][ T678] ================================================================== [ 198.508203][ T678] BUG: KASAN: slab-use-after-free in __list_add_valid+0xf0/0x100 [ 198.511794][ T678] Read of size 8 at addr ffff88801bfca008 by task syz-executor.3/678 [ 198.515432][ T678] 16:07:02 executing program 0: r0 = openat$sr(0xffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850", 0x19, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) [ 198.516504][ T678] CPU: 0 PID: 678 Comm: syz-executor.3 Not tainted 6.4.0-syzkaller #0 16:07:02 executing program 1: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x80) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) r2 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = semget$private(0x0, 0x2, 0x400) semctl$GETVAL(r3, 0x3, 0xc, &(0x7f0000000440)=""/71) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r2, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r5 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', 0x0, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) r6 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r6, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r8 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r8, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r7, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r10 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x4, &(0x7f0000000d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2}, [@ldst={0x1}]}, &(0x7f0000000d80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, r10, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$sock_inet6_SIOCDIFADDR(r10, 0x8936, &(0x7f00000036c0)={@mcast1, 0x4e}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a80)={r10, 0xe0, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000037c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000003800)=[0x0, 0x0], &(0x7f0000003840)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000003880)=[{}], 0x8, 0x10, &(0x7f00000038c0), &(0x7f0000003900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000003940)}}, 0x10) r12 = openat$sr(0xffffff9c, &(0x7f0000003c00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r11, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000001000)={0x400, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [{{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x8, 0x2, 0x6, 0x7}, {0x0, 0x7, 0xff, 0x200}, {0x21, 0x9, 0x1, 0x7}, {0x6, 0x9, 0xff, 0x2}, {0x7, 0x94, 0xd9, 0x3}, {0x5d, 0x5, 0x3, 0x1000}, {0x4, 0x0, 0x1}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1e5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r9}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x67e}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x60}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}]}, 0x400}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000003cc0)={'ip6_vti0\x00', &(0x7f0000003c40)={'syztnl0\x00', r4, 0x29, 0x4, 0x5, 0x3, 0x64, @rand_addr=' \x01\x00', @mcast1, 0x700, 0x700, 0x80000001, 0x29}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'gre0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73797a746e6c3109000000000fb80180", @ANYRES32=0x0, @ANYBLOB="0080002000000080000000044322004c00640000b22f9078640101020a01010000862effffffff000d9f57be31bc91a0c149c60f0110a4d7e8d89f1f93351d85a58be52d0007d9d0ffff5405040254940400000194040100"]}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip_vti0\x00', 0x0, 0x40, 0x8000, 0x8, 0x6, {{0x15, 0x4, 0x2, 0x6, 0x54, 0x66, 0x0, 0x0, 0x0, 0x0, @broadcast, @private=0xa010100, {[@ssrr={0x89, 0x13, 0x32, [@dev={0xac, 0x14, 0x14, 0x1c}, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x20, 0x64, 0x0, 0x3, [0xf, 0x2, 0x8001, 0x34, 0xc8, 0xffffffff, 0x2]}, @generic={0x44, 0x9, "9c35886ad58c10"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'erspan0\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x20, 0x7840, 0x7, 0x6, {{0x16, 0x4, 0x0, 0x0, 0x58, 0x65, 0x0, 0x7, 0x4, 0x0, @rand_addr=0x64010102, @private=0xa010102, {[@generic={0x82, 0xb, "a8ef48915a67a39d5a"}, @timestamp={0x44, 0xc, 0x3d, 0x0, 0x1, [0x80000001, 0x5]}, @timestamp_prespec={0x44, 0x2c, 0x97, 0x3, 0xa, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1}, {@dev={0xac, 0x14, 0x14, 0xe}}, {@private=0xa010101, 0x9}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x17b}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xe8, r1, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x20000804}, 0x40) [ 198.520547][ T678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 198.527648][ T678] Call Trace: [ 198.529154][ T678] [ 198.530461][ T678] dump_stack_lvl+0xd9/0x150 [ 198.532368][ T678] print_address_description.constprop.0+0x2c/0x3c0 [ 198.535050][ T678] ? __list_add_valid+0xf0/0x100 [ 198.537045][ T678] kasan_report+0x11c/0x130 [ 198.538932][ T678] ? __list_add_valid+0xf0/0x100 [ 198.540801][ T678] __list_add_valid+0xf0/0x100 [ 198.542596][ T678] nfc_llcp_register_device+0x7a8/0x9e0 [ 198.544623][ T678] nfc_register_device+0x70/0x3c0 [ 198.546913][ T678] nci_register_device+0x7cb/0xb50 [ 198.549359][ T678] ? nci_init_complete_req+0x3f0/0x3f0 [ 198.551886][ T678] ? lockdep_init_map_type+0x21e/0x810 [ 198.554407][ T678] ? lockdep_init_map_type+0x21e/0x810 [ 198.556880][ T678] ? virtual_ncidev_read+0x4b0/0x4b0 16:07:02 executing program 0: r0 = openat$sr(0xffffff9c, 0x0, 0x0, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850", 0x19, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) [ 198.559255][ T678] virtual_ncidev_open+0x14f/0x230 [ 198.561650][ T678] misc_open+0x37a/0x4a0 [ 198.563427][ T678] ? misc_devnode+0x120/0x120 [ 198.565428][ T678] chrdev_open+0x26a/0x770 [ 198.567342][ T678] ? __unregister_chrdev+0x110/0x110 [ 198.569476][ T678] ? fsnotify_perm.part.0+0x221/0x610 [ 198.571733][ T678] do_dentry_open+0x6cc/0x13f0 [ 198.573735][ T678] ? __unregister_chrdev+0x110/0x110 16:07:02 executing program 0: openat$sr(0xffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CDROM_SEND_PACKET(0xffffffffffffffff, 0x5393, &(0x7f0000000100)={"e8cd27141c0f4956a816eae3", &(0x7f0000000000)="345a76606209600cc2bb8ade4046cfec09a3a2c4abba9ae850", 0x19, 0x7ff, &(0x7f0000000080)={0x5, 0x0, 0x3, 0xb, 0x0, 0x1, 0x0, "adb8f044", 0x3, "c8a2080d", 0x3, 0x80, 0x4, "7f2580", "9bc16a7f0a2a3d6bdda5e3561ba5f925c6d723ca767e4f61810d88b0b2b3014382cf984dd271796e37ab32bb7a28"}, 0x2, 0x6, 0x3ff, &(0x7f00000000c0)}) [ 198.576091][ T678] ? may_open+0x1f6/0x420 [ 198.578376][ T678] path_openat+0x1baa/0x2750 [ 198.580550][ T678] ? path_lookupat+0x840/0x840 [ 198.582598][ T678] do_filp_open+0x1ba/0x410 [ 198.584350][ T678] ? may_open_dev+0xf0/0xf0 [ 198.586166][ T678] ? find_held_lock+0x2d/0x110 [ 198.588064][ T678] ? do_raw_spin_lock+0x124/0x2b0 [ 198.589974][ T678] ? spin_bug+0x1c0/0x1c0 [ 198.592037][ T678] ? _raw_spin_unlock+0x28/0x40 [ 198.594281][ T678] ? alloc_fd+0x2e4/0x750 [ 198.595864][ T678] do_sys_openat2+0x16d/0x4c0 [ 198.597804][ T678] ? build_open_flags+0x720/0x720 [ 198.600009][ T678] ? xfd_validate_state+0x5d/0x180 [ 198.602088][ T678] __ia32_compat_sys_openat+0x143/0x1f0 [ 198.604469][ T678] ? __x64_compat_sys_open+0x1c0/0x1c0 [ 198.607058][ T678] ? syscall_enter_from_user_mode_prepare+0x1d/0x50 [ 198.609799][ T678] __do_fast_syscall_32+0x65/0xf0 [ 198.611826][ T678] do_fast_syscall_32+0x33/0x70 [ 198.613610][ T678] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 198.615857][ T678] RIP: 0023:0xf7fe2579 [ 198.617343][ T678] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 198.625153][ T678] RSP: 002b:00000000f7fdd5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000127 [ 198.628156][ T678] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 0000000020000000 [ 198.631110][ T678] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 [ 198.634155][ T678] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 198.637791][ T678] R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000 [ 198.641336][ T678] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 198.644915][ T678] [ 198.646320][ T678] [ 198.647406][ T678] Allocated by task 658: [ 198.649288][ T678] kasan_save_stack+0x22/0x40 [ 198.651393][ T678] kasan_set_track+0x25/0x30 [ 198.653464][ T678] __kasan_kmalloc+0xa2/0xb0 [ 198.655580][ T678] nfc_llcp_register_device+0x49/0x9e0 [ 198.657747][ T678] nfc_register_device+0x70/0x3c0 [ 198.659736][ T678] nci_register_device+0x7cb/0xb50 [ 198.661632][ T678] virtual_ncidev_open+0x14f/0x230 [ 198.663468][ T678] misc_open+0x37a/0x4a0 [ 198.665007][ T678] chrdev_open+0x26a/0x770 [ 198.666679][ T678] do_dentry_open+0x6cc/0x13f0 [ 198.668539][ T678] path_openat+0x1baa/0x2750 [ 198.670416][ T678] do_filp_open+0x1ba/0x410 [ 198.672147][ T678] do_sys_openat2+0x16d/0x4c0 [ 198.674023][ T678] __ia32_compat_sys_openat+0x143/0x1f0 [ 198.676284][ T678] __do_fast_syscall_32+0x65/0xf0 [ 198.678284][ T678] do_fast_syscall_32+0x33/0x70 [ 198.680091][ T678] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 198.682649][ T678] [ 198.683534][ T678] Freed by task 657: [ 198.685021][ T678] kasan_save_stack+0x22/0x40 [ 198.686726][ T678] kasan_set_track+0x25/0x30 [ 198.688425][ T678] kasan_save_free_info+0x2e/0x40 [ 198.690625][ T678] ____kasan_slab_free+0x160/0x1c0 [ 198.693116][ T678] slab_free_freelist_hook+0x8b/0x1c0 [ 198.696327][ T678] __kmem_cache_free+0xaf/0x2d0 [ 198.698929][ T678] nfc_llcp_unregister_device+0x1ba/0x260 [ 198.701526][ T678] nfc_unregister_device+0x196/0x330 [ 198.703661][ T678] virtual_ncidev_close+0x52/0xb0 [ 198.705811][ T678] __fput+0x27c/0xa90 [ 198.707575][ T678] task_work_run+0x16f/0x270 [ 198.709501][ T678] exit_to_user_mode_prepare+0x210/0x240 [ 198.712369][ T678] syscall_exit_to_user_mode+0x1d/0x50 [ 198.715149][ T678] __do_fast_syscall_32+0x72/0xf0 [ 198.717290][ T678] do_fast_syscall_32+0x33/0x70 [ 198.719172][ T678] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 198.722156][ T678] [ 198.723286][ T678] Last potentially related work creation: [ 198.725994][ T678] kasan_save_stack+0x22/0x40 [ 198.728384][ T678] __kasan_record_aux_stack+0xbc/0xd0 [ 198.730933][ T678] __call_rcu_common.constprop.0+0x99/0x7e0 [ 198.733713][ T678] netlink_release+0xcde/0x1e40 [ 198.736507][ T678] __sock_release+0xcd/0x290 [ 198.739176][ T678] sock_close+0x1c/0x20 [ 198.741515][ T678] __fput+0x27c/0xa90 [ 198.743465][ T678] task_work_run+0x16f/0x270 [ 198.745674][ T678] exit_to_user_mode_prepare+0x210/0x240 [ 198.748317][ T678] syscall_exit_to_user_mode+0x1d/0x50 [ 198.750926][ T678] __do_fast_syscall_32+0x72/0xf0 [ 198.753297][ T678] do_fast_syscall_32+0x33/0x70 [ 198.755556][ T678] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 198.758471][ T678] [ 198.759618][ T678] Second to last potentially related work creation: [ 198.762818][ T678] kasan_save_stack+0x22/0x40 [ 198.765213][ T678] __kasan_record_aux_stack+0xbc/0xd0 [ 198.767701][ T678] __call_rcu_common.constprop.0+0x99/0x7e0 [ 198.770156][ T678] netlink_release+0xcde/0x1e40 [ 198.772443][ T678] __sock_release+0xcd/0x290 [ 198.774442][ T678] sock_close+0x1c/0x20 [ 198.776375][ T678] __fput+0x27c/0xa90 [ 198.778511][ T678] task_work_run+0x16f/0x270 [ 198.780926][ T678] exit_to_user_mode_prepare+0x210/0x240 [ 198.783459][ T678] syscall_exit_to_user_mode+0x1d/0x50 [ 198.785893][ T678] __do_fast_syscall_32+0x72/0xf0 [ 198.788015][ T678] do_fast_syscall_32+0x33/0x70 [ 198.789963][ T678] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 198.792772][ T678] [ 198.793969][ T678] The buggy address belongs to the object at ffff88801bfca000 [ 198.793969][ T678] which belongs to the cache kmalloc-2k of size 2048 [ 198.800306][ T678] The buggy address is located 8 bytes inside of [ 198.800306][ T678] freed 2048-byte region [ffff88801bfca000, ffff88801bfca800) [ 198.806565][ T678] [ 198.807723][ T678] The buggy address belongs to the physical page: [ 198.810660][ T678] page:ffffea00006ff200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1bfc8 [ 198.814272][ T678] head:ffffea00006ff200 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 198.818149][ T678] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 198.821626][ T678] page_type: 0xffffffff() [ 198.823436][ T678] raw: 00fff00000010200 ffff888012442f00 ffffea0000942400 dead000000000002 [ 198.827469][ T678] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000 [ 198.831168][ T678] page dumped because: kasan: bad access detected [ 198.833967][ T678] page_owner tracks the page as allocated [ 198.837117][ T678] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd28c0(GFP_NOWAIT|__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5142, tgid 5142 (syz-executor.2), ts 40880370285, free_ts 40873154737 [ 198.847261][ T678] post_alloc_hook+0x2db/0x350 [ 198.849527][ T678] get_page_from_freelist+0xf41/0x2c00 [ 198.852144][ T678] __alloc_pages+0x1cb/0x4a0 [ 198.854211][ T678] alloc_pages+0x1aa/0x270 [ 198.855997][ T678] allocate_slab+0x25f/0x390 [ 198.858019][ T678] ___slab_alloc+0xa91/0x1400 [ 198.860381][ T678] __slab_alloc.constprop.0+0x56/0xa0 [ 198.863517][ T678] __kmem_cache_alloc_node+0x136/0x320 [ 198.866650][ T678] __kmalloc_node_track_caller+0x4f/0x1a0 [ 198.869573][ T678] kmalloc_reserve+0xf0/0x270 [ 198.871932][ T678] pskb_expand_head+0x237/0x1170 [ 198.874488][ T678] netlink_trim+0x1ea/0x240 [ 198.876724][ T678] netlink_broadcast+0x63/0xd90 [ 198.879141][ T678] nlmsg_notify+0x93/0x280 [ 198.880970][ T678] rtnetlink_event+0x178/0x1f0 [ 198.882912][ T678] notifier_call_chain+0xb6/0x3c0 [ 198.884961][ T678] page last free stack trace: [ 198.886978][ T678] free_unref_page_prepare+0x62e/0xcb0 [ 198.889551][ T678] free_unref_page+0x33/0x370 [ 198.891976][ T678] qlist_free_all+0x6a/0x170 [ 198.894323][ T678] kasan_quarantine_reduce+0x195/0x220 [ 198.897159][ T678] __kasan_slab_alloc+0x63/0x90 [ 198.899666][ T678] __kmem_cache_alloc_node+0x17c/0x320 [ 198.902200][ T678] kmalloc_trace+0x26/0xe0 [ 198.904228][ T678] ref_tracker_alloc+0x158/0x580 [ 198.906406][ T678] net_rx_queue_update_kobjects+0x2d2/0x640 [ 198.909578][ T678] netdev_register_kobject+0x279/0x400 [ 198.912871][ T678] register_netdevice+0xd77/0x1640 [ 198.915110][ T678] team_newlink+0x92/0x150 [ 198.917143][ T678] __rtnl_newlink+0x10c2/0x1840 [ 198.919304][ T678] rtnl_newlink+0x68/0xa0 [ 198.921111][ T678] rtnetlink_rcv_msg+0x43d/0xd50 [ 198.923256][ T678] netlink_rcv_skb+0x165/0x440 [ 198.925455][ T678] [ 198.926674][ T678] Memory state around the buggy address: [ 198.929111][ T678] ffff88801bfc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 198.932626][ T678] ffff88801bfc9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 198.936551][ T678] >ffff88801bfca000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 198.939541][ T678] ^ [ 198.941246][ T678] ffff88801bfca080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 198.944680][ T678] ffff88801bfca100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 198.947688][ T678] ================================================================== [ 198.951960][ T678] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 198.955421][ T678] CPU: 1 PID: 678 Comm: syz-executor.3 Not tainted 6.4.0-syzkaller #0 [ 198.959205][ T678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 198.963406][ T678] Call Trace: [ 198.965181][ T678] [ 198.966627][ T678] dump_stack_lvl+0xd9/0x150 [ 198.968826][ T678] panic+0x686/0x730 [ 198.970566][ T678] ? panic_smp_self_stop+0xa0/0xa0 [ 198.972909][ T678] ? preempt_schedule_thunk+0x1a/0x20 [ 198.975445][ T678] ? preempt_schedule_common+0x45/0xb0 [ 198.977994][ T678] check_panic_on_warn+0xb1/0xc0 [ 198.980307][ T678] end_report+0xe9/0x120 [ 198.982303][ T678] ? __list_add_valid+0xf0/0x100 [ 198.984637][ T678] kasan_report+0xf9/0x130 [ 198.987056][ T678] ? __list_add_valid+0xf0/0x100 [ 198.989481][ T678] __list_add_valid+0xf0/0x100 [ 198.991745][ T678] nfc_llcp_register_device+0x7a8/0x9e0 [ 198.994317][ T678] nfc_register_device+0x70/0x3c0 [ 198.996661][ T678] nci_register_device+0x7cb/0xb50 [ 198.999021][ T678] ? nci_init_complete_req+0x3f0/0x3f0 [ 199.001535][ T678] ? lockdep_init_map_type+0x21e/0x810 [ 199.004048][ T678] ? lockdep_init_map_type+0x21e/0x810 [ 199.006562][ T678] ? virtual_ncidev_read+0x4b0/0x4b0 [ 199.009022][ T678] virtual_ncidev_open+0x14f/0x230 [ 199.011430][ T678] misc_open+0x37a/0x4a0 [ 199.013411][ T678] ? misc_devnode+0x120/0x120 [ 199.015606][ T678] chrdev_open+0x26a/0x770 [ 199.017661][ T678] ? __unregister_chrdev+0x110/0x110 [ 199.020114][ T678] ? fsnotify_perm.part.0+0x221/0x610 [ 199.022653][ T678] do_dentry_open+0x6cc/0x13f0 [ 199.024939][ T678] ? __unregister_chrdev+0x110/0x110 [ 199.027521][ T678] ? may_open+0x1f6/0x420 [ 199.029788][ T678] path_openat+0x1baa/0x2750 [ 199.032189][ T678] ? path_lookupat+0x840/0x840 [ 199.034437][ T678] do_filp_open+0x1ba/0x410 [ 199.036558][ T678] ? may_open_dev+0xf0/0xf0 [ 199.038672][ T678] ? find_held_lock+0x2d/0x110 [ 199.040937][ T678] ? do_raw_spin_lock+0x124/0x2b0 [ 199.043275][ T678] ? spin_bug+0x1c0/0x1c0 [ 199.045389][ T678] ? _raw_spin_unlock+0x28/0x40 [ 199.047875][ T678] ? alloc_fd+0x2e4/0x750 [ 199.050130][ T678] do_sys_openat2+0x16d/0x4c0 [ 199.052411][ T678] ? build_open_flags+0x720/0x720 [ 199.055104][ T678] ? xfd_validate_state+0x5d/0x180 [ 199.057808][ T678] __ia32_compat_sys_openat+0x143/0x1f0 [ 199.060550][ T678] ? __x64_compat_sys_open+0x1c0/0x1c0 [ 199.063128][ T678] ? syscall_enter_from_user_mode_prepare+0x1d/0x50 [ 199.066171][ T678] __do_fast_syscall_32+0x65/0xf0 [ 199.068506][ T678] do_fast_syscall_32+0x33/0x70 [ 199.070795][ T678] entry_SYSENTER_compat_after_hwframe+0x70/0x82 [ 199.073698][ T678] RIP: 0023:0xf7fe2579 [ 199.075594][ T678] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 199.084369][ T678] RSP: 002b:00000000f7fdd5cc EFLAGS: 00000296 ORIG_RAX: 0000000000000127 [ 199.088187][ T678] RAX: ffffffffffffffda RBX: 00000000ffffff9c RCX: 0000000020000000 [ 199.091854][ T678] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 [ 199.095504][ T678] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 199.099172][ T678] R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000 [ 199.102805][ T678] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 199.106360][ T678] [ 199.108309][ T678] Kernel Offset: disabled [ 199.110343][ T678] Rebooting in 86400 seconds.. VM DIAGNOSIS: 16:07:02 Registers: info registers vcpu 0 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff84884cd5 RDI=ffffffff920c8140 RBP=ffffffff920c8100 RSP=ffffc90002f67278 R8 =0000000000000001 R9 =000000000000001f R10=0000000000000000 R11=6572617764726148 R12=0000000000000000 R13=0000000000000030 R14=ffffffff84884c70 R15=0000000000000000 RIP=ffffffff84884cff RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] FS =0000 0000000000000000 ffffffff 00c00000 GS =0063 ffff88802c600000 ffffffff 00d0f300 DPL=3 DS [-WA] LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00000000f7378000 CR3=0000000066866000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004167bcad00000000 XMM03=32322035312e322e302e303120303634 XMM04=00000000000000050000000000a4fb49 XMM05=00000000000000000000000001f06210 XMM06=00000000000000050000000000a4fb4e XMM07=00000000000000000000000001f0620e XMM08=00000000000000060000000000a52559 XMM09=00000000000000000000000001f0620b XMM10=00000000000000030000000000a4c7d9 XMM11=00000000000000000000000001f0620c XMM12=00000000000000060000000000a523e5 XMM13=00000000000000000000000001f0620a XMM14=00000000000000040000000000a4db3f XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=00000000000000c4 RBX=00000000000000c4 RCX=1ffffffff1cf4cd1 RDX=ffffffffffffffff RSI=0000000000000000 RDI=ffffc90003af7f58 RBP=ffffc90003af7f30 RSP=ffffc90003af7f18 R8 =0000000000000001 R9 =0000000000000001 R10=fffffbfff1cf52fa R11=0000000000000000 R12=ffffc90003af7f58 R13=0000000000000000 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff812e5390 RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] FS =0000 0000000000000000 ffffffff 00c00000 GS =0063 ffff88802c700000 ffffffff 00d0f300 DPL=3 DS [-WA] LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000057b03efc CR3=000000005d794000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 2 RAX=0000000000002818 RBX=ffffc900075e2818 RCX=0000000000000100 RDX=0000000000000000 RSI=ffffffff85a4213c RDI=ffff88801afca436 RBP=0000000000000019 RSP=ffffc90004f07a60 R8 =0000000000000005 R9 =0000000000000000 R10=000000000000001a R11=0000000000094001 R12=000000000000001a R13=ffff88801afca400 R14=0000000000000000 R15=00000000ff8d0ec0 RIP=ffffffff85a421a5 RFL=00000286 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 ffffffff 00c00000 DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 000000c00049d890 ffffffff 00c00000 GS =0000 ffff88802c800000 ffffffff 00c00000 LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe0000091000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000008f000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000000000125bff0 CR3=000000001b773000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa1 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000000000000000000001f0 XMM01=00000000000000000000000000000000 XMM02=0000000000000000416899b700000000 XMM03=307830202c307830202c317830202c7d XMM04=5f6d6c642474616e65706f203d203072 XMM05=7d5d7d3878307b3d5845444e495f5645 XMM06=202c6378307b3d52454441454840202c XMM07=5b202c317830202c307830202c317830 XMM08=45444145485f415f4c4f4f5448544540 XMM09=3878307b3d5845444e495f5645445f52 XMM10=7830202c7d38657830202c7d5d7d5d7d XMM11=327830202c307830202c307830202c31 XMM12=0a2930347830202c7d34303830303030 XMM13=66306439643730303064323565623835 XMM14=30343934353230343035303435666666 XMM15=00000000000000000000000000000000 info registers vcpu 3 RAX=0000000000000000 RBX=ffff88802c644ea0 RCX=0000000000000000 RDX=ffff888015c88000 RSI=ffffffff8179055d RDI=0000000000000005 RBP=0000000000000003 RSP=ffffc9000097f948 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=ffffed10058c89d5 R13=0000000000000000 R14=dffffc0000000000 R15=0000000000000001 RIP=ffffffff8179055f RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802c900000 ffffffff 00c00000 LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe00000d8000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe00000d6000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000000002cd25000 CR3=000000000c571000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=69253a69256325003d45444f4d564544 XMM01=00007ffcaf7d6ca00000003000000018 XMM02=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM03=000000ff00000000ff000000ff000000 XMM04=000000000000000000000000ff000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=0000000000000000000000000000ff00 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000