000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0xffffffc3}, 0x0) 03:35:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipmr_delroute={0x48, 0x19, 0x200, 0x70bd29, 0x25dfdbfb, {0x80, 0x80, 0x10, 0x0, 0x103, 0x4, 0xfe, 0x6, 0x1000}, [@RTA_IIF={0x8, 0x3, r3}, @RTA_PRIORITY={0x8, 0x6, 0x800}, @RTA_MULTIPATH={0xc, 0x9, {0xff1, 0x8, 0x4}}, @RTA_IIF={0x8, 0x3, r7}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x4040890}, 0x20000040) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@newlink={0x38, 0x10, 0x10, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, [@IFLA_GROUP={0x8}, @IFLA_NET_NS_PID={0x8, 0x13, 0xffffffffffffffff}, @IFLA_MTU={0x8, 0x4, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x14}, 0x0) 03:35:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8f8}]}, 0x28}}, 0x0) 03:35:00 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x6000000) 03:35:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1001}], 0xbb, 0x0, 0x0) 03:35:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x80001, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) epoll_create1(0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="4f7378c6402bbd0080000000"], &(0x7f00000004c0)=""/58, 0x3a) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x910}]}, 0x28}}, 0x0) 03:35:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x20, 0x32, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x20004080}, 0x90) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0xffffffea}, 0x0) 03:35:00 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x7000000) 03:35:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1002}], 0xbb, 0x0, 0x0) 03:35:00 executing program 4: perf_event_open(&(0x7f0000001900)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) fcntl$setlease(r0, 0x400, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) clone3(&(0x7f0000000440)={0x19004000, &(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000200), {0x35}, &(0x7f0000000500)=""/4096, 0x1000, &(0x7f0000000240)=""/130, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0xfffd}, 0x0, 0x0, 0x0, 0x5}, r1, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r2 = socket$nl_route(0x10, 0x3, 0x0) lgetxattr(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000001600)=""/57, 0x39) openat2$dir(0xffffffffffffff9c, &(0x7f0000001500)='./file0\x00', &(0x7f0000001540)={0x82080, 0x20, 0x5}, 0x18) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x944}]}, 0x28}}, 0x0) 03:35:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000000080)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000080)) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x24a00, 0x192) poll(&(0x7f0000000040)=[{r1, 0x8}, {r0, 0x2038}, {r2, 0x1022}, {r3, 0x340}, {r0, 0x8684}, {r0, 0x82f74526b7f35b1e}, {r0, 0x4}, {0xffffffffffffffff, 0x1}], 0x8, 0x3) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000000800001f420fcde3552b4e12793d41000000"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0xf8, r6, 0x1, 0xc8, 0x6, @random="854dc82afa6e"}, 0x14) 03:35:00 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x8000000) 03:35:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0xffffffef}, 0x0) 03:35:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1003}], 0xbb, 0x0, 0x0) 03:35:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x948}]}, 0x28}}, 0x0) 03:35:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010000195d4797c1f019383000000005b", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}}, 0x0) 03:35:00 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x9000000) 03:35:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) setxattr$incfs_id(&(0x7f0000000340)='./file1\x00', &(0x7f0000000800), &(0x7f0000000840)={'0000000000000000000000000000000', 0x33}, 0x20, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="6f73782e4423bd25233c2d00"], &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) recvmsg(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)=""/173, 0xad}, {&(0x7f0000000500)=""/194, 0xc2}, {&(0x7f0000000080)=""/75, 0x4b}, {&(0x7f0000000600)=""/249, 0xf9}, {&(0x7f00000002c0)=""/40, 0x28}, {&(0x7f0000000340)}], 0x6, &(0x7f0000000700)=""/149, 0x95}, 0x12000) 03:35:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1004}], 0xbb, 0x0, 0x0) 03:35:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 03:35:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x988}]}, 0x28}}, 0x0) 03:35:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4607301f06140000000000000003003e00030000001a000000380000006400000001000100e0ff200002000500000005000000000000000000000000008a00000004000000c5080000ff070000f2d80000720f000053e26f00095bb8cb0d6aa05cbdae86bef94fc72282eb6b091d89634126eab13317a8a89bf92caf7004ff0e0420fd7ef3ffc669e50ade723105ac3629d0700b74398d4cf40087577ef97285cb00"/426], 0x1aa) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:00 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0xa000000) 03:35:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1005}], 0xbb, 0x0, 0x0) 03:35:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xb24}]}, 0x28}}, 0x0) 03:35:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) 03:35:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800fd0c9436c0f8f6528a53d9cbd581c2000010", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_newroute={0x38, 0x18, 0x100, 0x70bd2b, 0x25dfdbfd, {0xa, 0x80, 0x20, 0x20, 0x0, 0x3, 0x0, 0x7, 0x500}, [@RTA_EXPIRES={0x8, 0x17, 0xf12}, @RTA_MULTIPATH={0xc, 0x9, {0x1, 0x38, 0x9a}}, @RTA_PREF={0x5, 0x14, 0xf8}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) 03:35:00 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0xb000000) 03:35:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1006}], 0xbb, 0x0, 0x0) 03:35:01 executing program 3: r0 = getgid() setgroups(0x1, &(0x7f0000000000)=[r0]) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xb3c}]}, 0x28}}, 0x0) 03:35:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x2) 03:35:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) socket$nl_route(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1000, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x80000000}}, {@mode={'mode', 0x3d, 0x1000}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x10000}}], [{@euid_lt={'euid<', 0xee00}}, {@obj_user={'obj_user', 0x3d, '@#\xbd%#<-\x00'}}, {@obj_user={'obj_user', 0x3d, 'osx.'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@uid_lt={'uid<', r1}}, {@dont_measure}]}) 03:35:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1007}], 0xbb, 0x0, 0x0) 03:35:01 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0xc000000) 03:35:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1008}], 0xbb, 0x0, 0x0) 03:35:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xb4c}]}, 0x28}}, 0x0) 03:35:01 executing program 3: rename(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2, 0x7}}, './file0\x00'}) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@getchain={0x34, 0x66, 0x100, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0x5}, {0xb, 0x8}, {0x2, 0x8}}, [{0x8, 0xb, 0x9}, {0x8, 0xb, 0x8000}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x44040) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@ipv6_delroute={0xbc, 0x19, 0x200, 0x70bd27, 0x25dfdbfb, {0xa, 0x3c, 0x10, 0x6, 0xff, 0x0, 0xff, 0x4, 0x1800}, [@RTA_UID={0x8, 0x19, 0xee00}, @RTA_PREF={0x5, 0x14, 0x7}, @RTA_MULTIPATH={0xc, 0x9, {0xffff, 0x0, 0x4, r3}}, @RTA_METRICS={0x7a, 0x8, 0x0, 0x1, "860d2df6b523f0a4322ad5a786e0871e54da16e29a12a2f657a0138bc9d17146348138ae2a3d0d6365a1340adcb9746b4e43ea459387e0dc5535edc4d9f4efdbf63c21ddb7e12a67628875ab010910e883bf7cca575023fdcaf82bb8468b05ae7e4bb0d927d6aabbadc40a1f4c2d328c96876bfce4b3"}, @RTA_PRIORITY={0x8, 0x6, 0xd05c}]}, 0xbc}, 0x1, 0x0, 0x0, 0x5}, 0x40) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x170bd29, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x3) 03:35:01 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0xd000000) 03:35:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1009}], 0xbb, 0x0, 0x0) 03:35:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x24004800}, 0x0) 03:35:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000080)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xa01, 0x70bd2f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:01 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0xe000000) 03:35:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xb54}]}, 0x28}}, 0x0) 03:35:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x4) 03:35:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x100a}], 0xbb, 0x0, 0x0) 03:35:01 executing program 3: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@ipmr_delroute={0x2c, 0x19, 0x1, 0x70bd2b, 0x25dfdbfc, {0x80, 0x10, 0x14, 0x3, 0xff, 0x0, 0x0, 0x8, 0x1200}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x4}, @RTA_SRC={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getneightbl={0x14, 0x42, 0x2, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4044084) 03:35:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xb58}]}, 0x28}}, 0x0) 03:35:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:01 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x10000000) [ 2562.260139][T17860] __nla_validate_parse: 66 callbacks suppressed [ 2562.260154][T17860] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:35:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x5) [ 2562.329349][T17865] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2562.342981][T17865] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x100b}], 0xbb, 0x0, 0x0) 03:35:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="91afa603178a4fff571f1e407bb1534b68c800c63c085a089e8df667a329ba17c4ca190a15fbeed88f2e793270be816c4315c64da5fa1775493de0fbf8eef408e8f3ce67c08666bf8dd023a9370b01f1a6dadb88b6223c9a440fb3892ab2e50fcc5032e0b88b1eccc4a942d0b01b6dbc024c11faf30efb8fa38d19845452cda867e3511e206724da1c41896fce11918b66560c8446", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000dfffff0006ebdbca850eeb1ee641067abd63b9bdd9282a074c4340dae2f6f80cfd9fc268740cffab70c52092d6dd09bac0a661ee7db648fa5d943371"], 0x28}}, 0x0) 03:35:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xb64}]}, 0x28}}, 0x0) 03:35:02 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x11000000) 03:35:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="6f233c2d0e00000001030000"], &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2562.406012][T17875] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:35:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x6) 03:35:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x100c}], 0xbb, 0x0, 0x0) [ 2562.482758][T17882] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2562.494498][T17882] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010000108000000000000000004000000", @ANYRES32=0x0, @ANYBLOB="0000000000000008001b000000000000"], 0x28}}, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000003340), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000004640)={0x0, 0x0, &(0x7f0000004600)={&(0x7f0000000040)={0x124, r1, 0x501, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x106, 0x2a, [@fast_bss_trans={0x37, 0x100, {0x0, 0x7, "8acd1c9ddf6064467858abe32a18729d", "1701423bebf403cbfb648a3f5431dd24cb8edaa835eeb0081df999cecbb8ffaf", "20c604958b1ab0c49070c6ec42553a8edc8d938b307b75d5b441c1fc0efe1311", [{0x0, 0x24, "ceeea99cebb7f655da3c4f7165b06df6ded93959f9067abf19043131068319db1f916c0b"}, {0x0, 0x3, "d133f8"}, {0x0, 0x21, "206d164e8af6be20a2ca91b72194f63959eefd886f2bec0223e01be812412b8c16"}, {0x0, 0x21, "63d77a281f7b45908b4bde36ed95821be7a3fb84d83bc277ca81bd9725799b52c5"}, {0x0, 0x17, "9c9b27c5cf9ba318173c6e15abfc058d61df162d9dee0a"}, {0x0, 0x1d, "65d5cb55d8ca50049684a0259383fc687deee72c4da107f7b4265fe08e"}, {0x0, 0x3, "9cef65"}]}}]}]}, 0x124}}, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000000)=0x9, 0x4) 03:35:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xb70}]}, 0x28}}, 0x0) 03:35:02 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x12000000) [ 2562.529849][T17891] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:35:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x100d}], 0xbb, 0x0, 0x0) 03:35:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x7) 03:35:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x20000, 0x44, 0x1f}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_delrule={0x24, 0x21, 0x1, 0x70bd27, 0x25dfdbfe, {0x2, 0x10, 0x0, 0x1, 0x4, 0x0, 0x0, 0x6, 0xc}, [@FRA_SRC={0x8, 0x2, @rand_addr=0x64010101}]}, 0x24}, 0x1, 0x0, 0x0, 0x24048080}, 0x4000001) 03:35:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xb88}]}, 0x28}}, 0x0) [ 2562.639405][T17902] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2562.652046][T17904] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2562.666328][T17906] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 03:35:02 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x1ffff000) 03:35:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) openat$cgroup(r2, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@ipv6_deladdrlabel={0x44, 0x49, 0x400, 0x70bd28, 0x25dbdbff, {0xa, 0x0, 0x40, 0x0, r3, 0x8000}, [@IFAL_ADDRESS={0x14, 0x1, @remote}, @IFAL_ADDRESS={0x14, 0x1, @remote}]}, 0x44}}, 0x0) 03:35:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x100e}], 0xbb, 0x0, 0x0) 03:35:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbbc}]}, 0x28}}, 0x0) 03:35:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=@ipv6_getrule={0x1c, 0x22, 0x2, 0x70bd2b, 0x25dfdbfe, {0xa, 0x10, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1b}, ["", "", "", "", ""]}, 0x3}, 0x1, 0x0, 0x0, 0x4084}, 0x0) lseek(r1, 0xf4, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimensat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={{r2, r3/1000+60000}, {0x0, 0x2710}}, 0x100) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/tty/ldiscs\x00', 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x60213028}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@delnexthop={0x40, 0x69, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [{0x8}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x1}, {0x8}, {0x8, 0x1, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x24048015}, 0x4000000) 03:35:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x8) 03:35:02 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x20000000) 03:35:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1010}], 0xbb, 0x0, 0x0) 03:35:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbc0}]}, 0x28}}, 0x0) 03:35:02 executing program 3: ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x1, 0x9, 0x8, 0x0, 0x5, 0xffffffffffffffff}) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x242, 0x141) umount2(&(0x7f0000000240)='./file0\x00', 0x2) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x5}, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca}, 0x0, 0xffdffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="578a65b7ddfb5d4c997bb40c96eddd86dd27c699f56a478bf9f7ceb1b999e5a306e1ff87277d879700c266cc194c7ec025e5075c2edc98f33700a0a74926e51e1e14f358d756d3eb86c937e32f109615b25b667cc9464000e1581431a85451b3a7c6210e4d70d1ab4693e1c27edd54db232923056fc9062fa927febd5d"], &(0x7f00000004c0)=""/58, 0x3a) lgetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@random={'btrfs.', 'y\x00'}, &(0x7f0000000440)=""/57, 0x39) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000200), 0x2, 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000480)={'ip6tnl0\x00', &(0x7f0000000500)={'ip6gre0\x00', 0x0, 0x29, 0x1, 0x0, 0xffff, 0x62, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x7, 0x1, 0x3, 0x2}}) 03:35:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x9) 03:35:02 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x20eed000) 03:35:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbd4}]}, 0x28}}, 0x0) 03:35:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1011}], 0xbb, 0x0, 0x0) 03:35:02 executing program 3: connect$phonet_pipe(0xffffffffffffffff, &(0x7f0000000440)={0x23, 0x4a, 0x2, 0x8}, 0x10) r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x2, 0x1) getsockopt$PNPIPE_HANDLE(r0, 0x113, 0x3, &(0x7f0000000100), &(0x7f0000000180)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000000080)) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000200)) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000004c0)=0x1c, 0x80000) sendfile(r0, r2, 0x0, 0x100000001) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r3, 0xc020662a, &(0x7f0000000240)={0x9, 0xaf, 0x3, 0x1, 0x6, [{0x5, 0x4, 0x400, '\x00', 0x150a}, {0x9, 0x3, 0x7, '\x00', 0x1102}, {0x9, 0x6, 0x9, '\x00', 0x800}, {0x4, 0x2, 0x4, '\x00', 0x1000}, {0xc580, 0x8, 0x8e2, '\x00', 0x2b0f}, {0x22d, 0x2, 0x9, '\x00', 0x200}]}) connect$vsock_stream(r0, &(0x7f0000000500)={0x28, 0x0, 0x1, @hyper}, 0x10) r4 = openat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x420040, 0x80, 0x11}, 0x18) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x20010, r5, 0x2000) accept$phonet_pipe(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x10) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[], 0x28}}, 0x20000080) 03:35:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) r0 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, r0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xa) 03:35:02 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x25000000) 03:35:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1012}], 0xbb, 0x0, 0x0) 03:35:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbd8}]}, 0x28}}, 0x0) 03:35:02 executing program 3: rt_sigqueueinfo(0x0, 0x2f, &(0x7f0000000000)={0x6, 0x1f, 0x9}) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x22000884}, 0x0) 03:35:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) mknodat$null(r0, &(0x7f0000000080)='./file0\x00', 0x400, 0x103) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="fbe7b134994eada6"], 0x30}}, 0x0) 03:35:02 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x48000000) 03:35:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xc) 03:35:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1025}], 0xbb, 0x0, 0x0) 03:35:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbdc}]}, 0x28}}, 0x0) 03:35:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x33}}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:03 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x4c000000) 03:35:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xa201, 0x80) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1048}], 0xbb, 0x0, 0x0) 03:35:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbe0}]}, 0x28}}, 0x0) 03:35:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xf) 03:35:03 executing program 3: setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)=0x1, 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)=@newtaction={0x638, 0x30, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [{0x624, 0x1, [@m_ipt={0x1f0, 0x12, 0x0, 0x0, {{0x8}, {0x140, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x117, 0x6, {0x101, 'security\x00', 0x7f, 0x8, "e945308b83207d23bb6ac26447729cff403933f1850da3b6a8bcb75bb19577d9e742f04d7928277f7946158fcb81d1efc7243b09bdb0b759fc4adbc4d356e0055afc8c4c3bacd263da14c94e25dc26fff7847d7e8c00736dbc91759d1416b3fb7af81aab1b23f95f62cca096be1e3dc6904c262a708e5382e74382d7c411bdaba753c392da48211603f947e19c5782fb05b2fb9dcb20a513ca9c63b326d11de8f867ae427437d2bb6cc0a1e42fdb6f9726ad5530f3edba8f8ccd5018f3713abc2b461d1c890100fb91c95eb85267265a862592c0db3b029800286ea84f3ea9cb7ed8383e9499394968ba9ba5dd"}}, @TCA_IPT_TABLE={0x24, 0x1, 'mangle\x00'}]}, {0x8c, 0x6, "c2cf6ef8adb39da56e7cac03f34ac464e8e86dd2b9b712d901e7300e87d3ac02b58f64f11c9d3b0e62b2a9d0d6a58481456ab915d6161bd744813dff9c0f6ab10546920d5f3d72666491864febdb4d5feec1c3720406fcfae9a4fea4d9888dbd7cefa530e5684e37215b2c35a63be5f874099125eba9043b515ba18ccc5d38407d5b6a7d956dd230"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_csum={0x1e4, 0x1c, 0x0, 0x0, {{0x9}, {0xe4, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x6, 0x8, 0x3, 0x3, 0x4}, 0x1}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1ff, 0x0, 0x10000000, 0x0, 0x3}, 0x21}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xaf, 0x200, 0x3, 0x10000, 0x8}, 0x1c}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1dc3, 0x3, 0x10000000, 0x3, 0x7fff}, 0x61}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1f, 0x3, 0x8, 0x100, 0x6}, 0x3}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x80000001, 0x0, 0x3, 0x2, 0xffff06cf}, 0x60}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x8e, 0x8, 0x10000000, 0x5, 0x6}, 0x73}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x2, 0x10001, 0x6, 0x400, 0x3}, 0x7e}}]}, {0xd5, 0x6, "b5f8c02542b359dd420529fbcea558ec557f15c3b21507651aa2822d779d9e9e10c98904215d7fc0a2391e27963586813c557afdc2a961b6c749500dc1b9a95dd0a302714fa7eb92b318e5b4a2c2e8f594686a27915f945381844962e4613cb7751ccd209440c060d895406710c6252807a7a4401072c64c14b67b4c4f7597a8df86b57ddf6b340434d3773f756fcf3d070d3b751f1aaa3176c5c91fd876f8a99562553d7adfc3f59fbfa79d10f8efaec8aed456424e6315565c791780c198629a76dc01dfc15edfea405b6974d587e47a"}, {0xc, 0x7, {0x1, 0x68250d391f43d951}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_simple={0x98, 0x12, 0x0, 0x0, {{0xb}, {0x38, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0xb, 0x3, '%,{,&(]'}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_DATA={0x6, 0x3, ':\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x400, 0x1000, 0x7, 0x8, 0x9}}]}, {0x37, 0x6, "392ee8825981a14a42e8f56c5933325912ce3f81005837c6707cfe2fe424344b293bde0ec77d347934621fe033cd3f9deb6ca7"}, {0xc}, {0xc, 0x8, {0x1, 0x6}}}}, @m_connmark={0x1b4, 0xc, 0x0, 0x0, {{0xd}, {0xe4, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x800, 0x6, 0xffffffffffffffff, 0x1, 0x5}, 0x8001}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7fffffff, 0xffffffff, 0x0, 0x2, 0x76b9}, 0x7}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7, 0xffff, 0x6, 0x5, 0x100}, 0x3}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x8a, 0x5, 0x0, 0x7}, 0x2}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x2, 0x80000000, 0x8, 0x9eae}, 0x7}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0x5, 0x0, 0xa2c, 0x4}, 0x2}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffffc, 0x5, 0x5, 0x3fdf, 0x2}, 0x2}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xe18000, 0x7, 0x10000000, 0x10000, 0x4}, 0x20}}]}, {0xa4, 0x6, "fc6728b6441cf241dc7999785c86785cfd9286b687a87aea458faa1c478d6508d4dca42a948a52eb5d6b1cc4a71eac9aabace1037c9621ea03600264bf8f8bacd7aa3ef43489effc5b5b694d4ebc27f44ca224f5eafa7f00f240fbe2fb4b1bce1c2046826e706b6a073904140946a1be17a553c23d3723938c44dd60941e3fd4ffbe9d6135988df04c25a04527799ee720685bf99218993766d01944d9169d13"}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}]}]}, 0x638}, 0x1, 0x0, 0x0, 0x81}, 0x4008000) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:03 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x68000000) 03:35:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x104c}], 0xbb, 0x0, 0x0) 03:35:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbe4}]}, 0x28}}, 0x0) 03:35:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r1 = memfd_secret(0x0) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0x4) 03:35:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0xd8, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VF_PORTS={0xb8, 0x18, 0x0, 0x1, [{0x88, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "9bebfc3d1ad77338c2b1ff04b5b60867"}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_PROFILE={0x9, 0x2, '\'\'%}\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5a}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "672d52a1a05796e47dd392315ac4b7bb"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0xff}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "681c73a1fc37d2ca4c38b3a1ce609ae6"}, @IFLA_PORT_VF={0x8, 0x1, 0x3}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ab2eb74d6764630e6dd6a80cbb08729f"}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "cc9b3a35027dfe4af51a579750483788"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f87c779dac44fdab14e5a858086932e3"}]}]}]}, 0xd8}}, 0x40010) r1 = fsmount(0xffffffffffffffff, 0x1, 0x80) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x4004f506, &(0x7f0000000000)) 03:35:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x10) 03:35:03 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x6c000000) 03:35:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbe8}]}, 0x28}}, 0x0) 03:35:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1068}], 0xbb, 0x0, 0x0) 03:35:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffff8000}}, './file0\x00'}) r1 = syz_io_uring_complete(0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={&(0x7f0000000600)=""/132, 0x84, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x1d, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="8500000009000000540000005f70fe84ac5e4cc07341d4cd09000000009500000000000000"], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x2}, 0x10, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x5, &(0x7f0000000b40)=@raw=[@exit, @exit, @alu={0x7, 0x0, 0xa, 0x6, 0x2, 0x8, 0xfffffffffffffffc}, @exit, @jmp={0x5, 0x0, 0x7, 0x5, 0x0, 0xfffffffffffffff4, 0x8}], &(0x7f0000000b80)='syzkaller\x00', 0x0, 0xfd, &(0x7f0000000bc0)=""/253, 0x40f00, 0x1b, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000cc0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000d00)={0x3, 0xb, 0x7, 0x9}, 0x10, r6, r1}, 0x78) setsockopt$inet6_tcp_int(r5, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r5, 0x6, 0x9, 0x0, &(0x7f0000000080)) r7 = syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file1\x00', 0x3, 0x9, &(0x7f0000000980)=[{&(0x7f0000000300)="c3208d6d95675ed9d53f1585f8cfdf7def4fcd61fba55768dec6c7a02e8199e4829de40672cd70d55e6c323db18e88c70e32d133cbe007284827c13b8ccd7dd64b548c9b27ca1e8720e2cfe9380eb14645e37de38fa728974b727b2ed04d946516e5add7bc37f482a951166288a91313e749ab3e39a62e3f4c51e43d843889b22a555d0201bcf9b8d13e64ee64699bd25073445ed7ad5d0e30a092e5eb365000b985516b7136d02a", 0xa8, 0x9b}, {&(0x7f00000005c0)="ca6977e8ecb4607d40bdd1fdeba4e0870352f192a50145cfbeecdeaba9601a08df4b2fb5cbbfe8ec8459d572aa77b0bfeb461942a2b56e514433e259b0894ae6b350fd9df479fab6b769a2432aba999ab0fddbcc6bdee7181038b4bb569aab60452d4f17b3e7372a070eb69a97e69c212319afc92c303a4bdb7590c9bf841e3e787a443c9e2ab042043189c7a65fca51ea426f5ff01f00a3261c4853d5e1c1ba421e6a94dca60d7cee60f26a8fbb929a", 0xb0, 0x5}, {&(0x7f0000000680)="4b433326e6a0f7f9420b2c", 0xb, 0x1}, {&(0x7f00000006c0)="07eb856141", 0x5}, {&(0x7f0000000700)="9a927fa2d30f1bcb23cbc78ea826a93e13cb5a88f7226f15dec5f8b9aa3e0045e129dbc24772385c25d8bc8b110b88f1ddb8e488fa6c7a3a387a375adb5e030d89a6a77cad4ab98ece411d539878bfbfc2c645d21c6666d587e1496186351f02b3b08a1ed81fc822c899e94931bb93615f6641a8bbc0876307b7d286a5e09599d13117372caf4daf17390e0bd735035d8d23becd5d67da1366a2d35bf458816e4b3dc5ca531e0748981367dfba5b561afb9844fa75f551f1f8be8043e5023200000000", 0xc3, 0x8}, {&(0x7f0000000800)="ac35aaade0a213174940d33495fb99014f28d885c96db1e52202e630d2e77f0a5ffc6c2c8e3a69b2d2eb71b5bfcb2294de487df9fbbf08019bf3b695734d6f736968a14b164e0bc1", 0x48, 0x8}, {&(0x7f0000000880)="785862b57345305ef69b44c005d3b55ac143dc48526698", 0x17}, {&(0x7f00000008c0)="9d720a85934849", 0x7, 0xfff}, {&(0x7f0000000900)="8d2182257594828d4359db8ae401e6d46cb9239e1f5455727890002b343785023826fa25a83934922e33534370090f70c8db4eea55bb678cbe28321b3fe0ce33197cb7823bfe8dcd49f94e72d509299bf18f9f3c60fc69da05a35ce1abab09113b2e6e824a77491a933be1dcda44bde73c7a13094d62dbb51d4d0ba08afd5449", 0x80, 0x1}], 0x80000, &(0x7f0000000a80)={[{@shortname_winnt}, {@uni_xlate}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@dont_hash}, {@euid_lt={'euid<', r4}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@appraise}]}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000b00)=0x2000, 0x4) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r7, 0xc0709411, &(0x7f00000003c0)={{0x0, 0x4d, 0xf84, 0x5, 0x5, 0x3e3, 0x10000, 0xfffffffd, 0x1, 0x101, 0xae13, 0x1, 0xffffffffffffffc1, 0x1}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setuid(r4) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200), 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',version=9p2000.u,smackfsroot=/dev/vcsu\x00,fowner=', @ANYRESDEC=0xee01, @ANYBLOB=',defcontext=unconfined_u,obj_role=]W])\\&,fscontext=unconfined_u,euid<', @ANYRESDEC=r4, @ANYBLOB="2c6575698fea4f3d35220f4a3807e551641c", @ANYRESDEC=0xee00, @ANYBLOB=',dont_hash,obj_role=/dev/vcsu\x00,\x00']) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x3, 0x4004, @fd, 0x9, 0x0, 0x0, 0x8, 0x1, {0x1}}, 0x6) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="240000000206030000000000000000001700000705000500010000009850fe5d2e960500dc0870e70ac94eff010007000000"], 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x24000000) 03:35:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x21) 03:35:03 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x74000000) 03:35:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbec}]}, 0x28}}, 0x0) 03:35:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x106c}], 0xbb, 0x0, 0x0) [ 2563.747837][T18051] loop3: detected capacity change from 0 to 15 03:35:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=@random={'btrfs.', '}\x00'}, &(0x7f0000000340)=""/23, 0x17) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x488}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) removexattr(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)=@random={'osx.', '}\x00'}) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') 03:35:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4084}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:03 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x7a000000) 03:35:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x60) [ 2563.799578][T18057] loop3: detected capacity change from 0 to 15 03:35:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbf0}]}, 0x28}}, 0x0) 03:35:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1074}], 0xbb, 0x0, 0x0) 03:35:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) chmod(&(0x7f0000000080)='./file0\x00', 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="6f08782e4023bd25233c2d00"], &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_deladdrlabel={0x44, 0x49, 0x300, 0x70bd2b, 0x25dfdbfb, {0xa, 0x0, 0x10, 0x0, r3, 0x5}, [@IFAL_ADDRESS={0x14, 0x1, @local}, @IFAL_ADDRESS={0x14, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4008040}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup(r5) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@getlink={0x68, 0x12, 0x300, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r7, 0x100, 0x100}, [@IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_BROADCAST={0xa, 0x2, @remote}, @IFLA_PHYS_SWITCH_ID={0x1d, 0x24, "bbb5f09e10c1a4f88d0ad542c2ffe0687c684f5ab8d7fef8ed"}, @IFLA_EVENT={0x8, 0x2c, 0x8001}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x2}]}, 0x68}, 0x1, 0x0, 0x0, 0x884}, 0x2) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x30000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r9, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r9, 0x6, 0x9, 0x0, &(0x7f0000000080)) getsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x8) 03:35:03 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0xffffffff) 03:35:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbf4}]}, 0x28}}, 0x0) 03:35:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x107a}], 0xbb, 0x0, 0x0) 03:35:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x300) 03:35:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbf8}]}, 0x28}}, 0x0) 03:35:03 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0xecf9, 0x1}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x300, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x24a0, 0x58402}, [@IFLA_GROUP={0x4}]}, 0x28}}, 0x0) 03:35:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) chmod(&(0x7f0000000440)='./file0\x00', 0x82) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=@newlink={0x60, 0x10, 0xe00, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x40, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x30, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x2001}, @IFLA_VLAN_EGRESS_QOS={0x1c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0xb846}}]}, @IFLA_VLAN_ID={0x6, 0x1, 0x4}]}}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4008800}, 0x0) sendmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x1d, r3, 0x2, {0x2, 0xf0, 0x3}, 0xfc}, 0x18, &(0x7f00000000c0)={&(0x7f0000000200)="7494b3310c3c543fc3f502320ddfdbe7235e5a766ad8743632cb9dd4f0070501182fdd64b54ef9723c9467799a63d4b22a7e12c216283a5f1f69f924566d234c2c6dbba6d0908e6f0ef7f6136b90a89828773923b0dc188d32d88d041ab227d1affde81424e41b0db9c15668035961a73bb642117f559f7f00ac81869dd17152f6e66622eb74c8cd8b6581f6a6f672a664f6d330f9ac2dc08dd5e268f26566334a2ce434eebf4137bf429b4f9535ce63c45fce26da82dddf0677e790a603b370e3bc1eba769d230ccb6b146dc777", 0xce}, 0x1, 0x0, 0x0, 0x4000}, 0xc0c0) 03:35:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1100}], 0xbb, 0x0, 0x0) 03:35:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x500) 03:35:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xbfc}]}, 0x28}}, 0x0) 03:35:03 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000080)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/hci\x00') preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r3 = dup2(r0, r2) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f00000000c0)=@gcm_128={{0x304}, "354cb22553cd4013", "7281daf1ed6d8098fbec16d19a7fc57d", "0aec8ab5", "d2e584993bb42e5f"}, 0x28) 03:35:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x801, 0x0, 0x25dfdbff, {}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'syzkaller0\x00'}]}, 0x34}}, 0x0) 03:35:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200), 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1200}], 0xbb, 0x0, 0x0) 03:35:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x5c3) 03:35:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc00}]}, 0x28}}, 0x0) 03:35:04 executing program 5: r0 = syz_io_uring_setup(0x30f2, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ef3000/0x2000)=nil, 0x2000, 0x2000002, 0x50, r0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index=0x3, 0x23ed, 0x0, 0x6, 0x2, 0x1}, 0x1000) syz_io_uring_setup(0xd85, &(0x7f0000000080)={0x0, 0x8869, 0x1, 0x0, 0x26}, &(0x7f0000ef3000/0x14000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:04 executing program 3: prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@setneightbl={0x34, 0x43, 0x10, 0x70bd2c, 0x25dfdbfd, {0xa}, [@NDTA_NAME={0x5, 0x1, '\x00'}, @NDTA_NAME={0x6, 0x1, '*\x00'}, @NDTA_THRESH1={0x8, 0x2, 0x400}, @NDTA_THRESH2={0x8, 0x3, 0x2}]}, 0x34}}, 0x0) 03:35:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x2000}], 0xbb, 0x0, 0x0) 03:35:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_io_uring_complete(0x0) utimensat(r0, &(0x7f0000000c80)='./file0\x00', &(0x7f0000000d40)={{0x0, 0xea60}, {0x77359400}}, 0x100) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) r1 = open(&(0x7f0000000080)='./file0\x00', 0x107003, 0x74) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r2 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$BTRFS_IOC_BALANCE_CTL(r2, 0x40049421, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000d80)=ANY=[@ANYBLOB="300000001fe8cf3c11144e814dc6da00000000010100000000004000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08000000000000000000188cb917754c0033882ff53710"], 0x30}}, 0x0) recvmsg$unix(r1, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000008c0)=""/125, 0x7d}, {&(0x7f0000000940)=""/179, 0xb3}, {&(0x7f0000000a00)=""/109, 0x6d}, {&(0x7f0000000a80)=""/114, 0x72}], 0x4, &(0x7f0000000b00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x20}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@ipv4, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={""/10, ""/2, @dev}}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000200)='./file0\x00', 0x9, 0x5, &(0x7f0000000440)=[{&(0x7f0000000500)="688fa3aea634a645212305caba4ee7aca7ac373f8fa2fc73e09c69ace0266b8b65d955ab20b372173dad86c5b808967b086f5a297c04913ed1d50188c8aa0b1d46e81a741a08a929350118d2016ec32b85f1f3bbb746cbea24d4cf2c08b764597f85279a1850e50e713df7c02176b6a66cbed0e30c0599a8c0f456a5216f247e89ce74e9f03bddf5d7626959dbbce33dfb1366cfe4bc41f0c85f8cc9b1501e8bbc7d09b38f6181f9a986b6624dd55a023b8716ad6502e8ad340c99347e2dc3cdda65193baf06f82a711d2db19d338387077df0324f99c82c8f3a7d50e31275dd1137fcfd99045cb88aad226d333d8424e0ef14a6a82733", 0xf7, 0x81}, {&(0x7f0000000600)="564fdc950ee57fa001218def0608e15e3a03de39e475976aa5ef4adf4c972eee248f3dde434313e02ffe56df4a033237f77a461c23c40e1e1f23a865c9ce06c9618cf20d956ff0a0d118d39498c05d42ab4277a97b565adc096d5294319451247b3fc489867434743b3a8715ccc6774e922c9a35f8135ddc7f7e7c52b475f416658e523742436c7a3ec7fb500092fc04f2eacdbaf1abe0c5f7412be1b171dbde2576fe84ffb70802ba5eb1a12e9e1ba3ec17f3b3cb283e0abf5e6bd8d9304c17a011b4405fea6582", 0xc8, 0x400}, {&(0x7f0000000240)="d34e4e168dae7d2f15abf0229e9a30743dfed8c115e216f742c394105065fac36f593a32664128c81c6a68582682152722c46ef52de4068bde48ba79c7e927dd784bbbbd8958b4b98ddaa465d44f08e669f9155ad54e90d6767ebdd529fce4638357d0e805e75ae0b1bdcb96e2", 0x6d, 0x86d4}, {&(0x7f0000000700)="69a362f5034f733d0435715aec432cf9d25f9b3e36b8c5d14ff11ede219c7b000f370ce31940f9d1b37e532c83e71410a4e6673b3751dd27e8d8bae96b2b9b8a0543355a4bf1fd86bfb8cf3cd4813d503f50c3fa0caf42ed0c5ee7c39ad416c60f142d4f749d61d01932b5cacaa12dd78a8ab95892f89a2813b10c04b037b047b71e8c4f90d6b9d671f4c145f9922577e4157503", 0x94, 0xad}, {&(0x7f00000007c0)="8386e0986e87ac06db9544da0de2940306aa75840c75e52edb2277cd22e89bb45feaaf7e7eb73eb329bd9c3ed02971dddb19122413c7e73c94c38df6b3fbc1b5b4cad1e73f78d8e95b5786d79c48af2201ddca54c662d04b070e1c6081f1d545bd7208031ef0091b065e8f6a9dd624deeb83883aadd04a45cca6c2199a4357d98d454d86c166a41f95f3c9af88d594768c416b4aee84a3120764890f92c1963f6416136684306b6d6e48586e05fb7ff7894bbe326b0d036015528979cd4e3f2c74525524d4e884584f5b8565b6d93e1d76dd8319a445c1a19819a094a2b829ff3edd675e9f567fd0e18bc6c349a91f618db72ec4", 0xf4, 0x4}], 0x8a5020, &(0x7f0000000cc0)={[{@nodots}, {@dots}, {@fat=@check_normal}], [{@subj_user={'subj_user', 0x3d, 'osx.'}}, {@hash}, {@fowner_gt={'fowner>', r4}}, {@uid_gt={'uid>', r5}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 03:35:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x600) 03:35:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc04}]}, 0x28}}, 0x0) 03:35:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv6_getrule={0x1c, 0x22, 0x300, 0x70bd2d, 0x25dfdbff, {0xa, 0x80, 0x10, 0x80, 0x4, 0x0, 0x0, 0x8, 0x3}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipv4_getaddr={0x68, 0x16, 0x200, 0x70bd2b, 0x25dfdbfd, {0x2, 0x1f, 0xa0, 0xfe}, [@IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_FLAGS={0x8, 0x8, 0x608}, @IFA_BROADCAST={0x8, 0x4, @rand_addr=0x64010100}, @IFA_LABEL={0x14, 0x3, 'gre0\x00'}, @IFA_CACHEINFO={0x14, 0x6, {0x10001, 0x400, 0x9}}, @IFA_BROADCAST={0x8, 0x4, @multicast1}, @IFA_FLAGS={0x8, 0x8, 0x441}]}, 0x68}, 0x1, 0x0, 0x0, 0x40004}, 0x20040004) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x2900}], 0xbb, 0x0, 0x0) 03:35:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc08}]}, 0x28}}, 0x0) [ 2564.553937][T18145] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59423 sclass=netlink_route_socket pid=18145 comm=syz-executor.4 [ 2564.571386][T18145] loop4: detected capacity change from 0 to 134 03:35:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000280)={@private1, 0x0}, &(0x7f0000000080)=0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=@newnexthop={0x48, 0x68, 0x20, 0x70bd25, 0x25dfdbfe, {0x0, 0x0, 0x3, 0x0, 0x4}, [@NHA_ENCAP_TYPE={0x6, 0x7, 0x1}, @NHA_OIF={0x8, 0x5, r2}, @NHA_ID={0x8, 0x1, 0x1}, @NHA_GROUP_TYPE={0x6}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x2}, @NHA_OIF={0x8, 0x5, r1}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000093ac6da66ec401243b077d5bd7da75aa8af9a3386552b12555a2501df388e934f464d324e5e531"], 0x28}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000340)={'ip6gre0\x00', r2, 0x2f, 0x0, 0x4, 0x80, 0x44, @mcast1, @private2, 0x0, 0x700, 0x0, 0x1ff}}) 03:35:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x700) 03:35:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000038e9e787000a00", @ANYRES32=0x0, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) 03:35:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x290b}], 0xbb, 0x0, 0x0) [ 2564.644523][T18145] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59423 sclass=netlink_route_socket pid=18145 comm=syz-executor.4 [ 2564.659166][T18157] loop4: detected capacity change from 0 to 134 03:35:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc0c}]}, 0x28}}, 0x0) 03:35:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x24, 0x10, 0x801, 0x70bd25, 0x0, {}, [@IFLA_VF_PORTS={0xffffffda}]}, 0x24}}, 0x0) 03:35:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x900) 03:35:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x3003}], 0xbb, 0x0, 0x0) 03:35:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) name_to_handle_at(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)=@ceph_nfs_snapfh={0x1c, 0x4e, {0x7, 0x5, 0x5, 0x3}}, &(0x7f0000000440), 0xc00) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000280)=0x0) syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000240)=[{&(0x7f0000000200)="b7423947bd765f48be808089dc39c99496eab51a3ef929d73bcbdd4a93e07ecd0d9bfa", 0x23, 0x7ff}, {&(0x7f0000000500)="67a7a6e8be44a03bc413c329a6fcd84d9edcbc7cda47f1e2531acebe0bf6137c4e048368f1075ea9a1684462633cae7d2d03cd058d58bd98a05d3567b7011d040d2aaa2a4149cd6c507d4a70df22f79c7699dd622bf7fa9fd209950c827a5f2d12a00310964baf52f90b7405acbfd1b67e4bd910b6ae13cb6ad2b4bf84f0a148e6c23b3619489e2edc5c8f8dbc2c61586233e0a6ddfa966bf1024201c7c8a6f4e61c6432b330e8d0334b180b871c04c2db3ec99a656623795fe17f0ea12728b5067e3148fc190676789afd299f96bb4a287ffdc43447", 0xd6, 0x101}], 0x2002000, &(0x7f0000000600)={[{'@#\xbd%#<-\x00'}, {'.\\&/,'}, {'2([()'}, {'\xe0'}, {'osx.'}, {'@#\xbd%#<-\x00'}, {}, {'@#\xbd%#<-\x00'}, {'@#\xbd%#<-\x00'}, {}], [{@obj_type={'obj_type', 0x3d, 'osx.'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise_type}, {@uid_eq={'uid', 0x3d, r1}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@euid_gt={'euid>', 0xee00}}, {@fsmagic={'fsmagic', 0x3d, 0x136}}, {@pcr={'pcr', 0x3d, 0x26}}]}) 03:35:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc10}]}, 0x28}}, 0x0) 03:35:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x6400}], 0xbb, 0x0, 0x0) 03:35:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x50}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xa00) [ 2564.958556][T18182] loop4: detected capacity change from 0 to 7 03:35:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc14}]}, 0x28}}, 0x0) 03:35:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x9f08}], 0xbb, 0x0, 0x0) 03:35:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x11240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, 0x900}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@initdev, @in=@loopback}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r6) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x204059, &(0x7f0000000740)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@fscache}, {@cache_none}, {@privport}, {@version_u}, {@cache_loose}, {@nodevmap}, {@noextend}], [{@fsname={'fsname', 0x3d, ':(].'}}, {@permit_directio}, {@smackfsroot={'smackfsroot', 0x3d, 'vlan1\x00'}}, {@subj_role={'subj_role', 0x3d, '@#\xbd%#<-\x00'}}, {@subj_role={'subj_role', 0x3d, '{@,%-+@'}}, {@context={'context', 0x3d, 'user_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'f\xea_j\xcf\xaf\x10\x053\xef\x7f\x97\x13\xa8S\xb0; O-\xe6\x0e\xa74\xc0{\x87p\xb7t\x94\xf8\xbdN2\xbb\xe9\x93\xe9\xf72H\x9b\x84\xc9\f\x82N\b\x85\xe4\x0f\x80\xbd,m%$\xd9\x9d=\x05M\xd6q\x85\f\x0e\xdfIH\x9cf\b\x91=\x12\xb0\xa9\xcf\xfe\b\x89\x80c\x85\\X\xcc?\x85\x18\xdb\x19\xec\x1a&^\x82^\x93\x10=\x92f%\xe4\xc48\xc4\xc61\x94\xc8\x9aS2\x86\xa9\xbc\xbfmG\x8a\xc85\xe0\x04O\xe0\xc4\x8fN\x85\xd5a\x87(U\xbe[\xd6\x01\xe2\xa3\xfa\x1fM0e\xca\xad\xd2y\x7f-\xbf>R\b\x88\xaa\x85z\xd5\x85+S\xce\x92\xa17\x85\x84\x9d)6\xa0\xa6\xe8\xa3\x19pi\x9b\xc9Sm\x8eou\t\xbcfQ\xf7\x18S\xb1\xc75\xdb'}}, {@fowner_gt={'fowner>', r6}}]}}) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="580000001800000227bd7000fbdbdf250a101409fe03cb0100150000050014000800000008000300", @ANYRES32=0x0, @ANYBLOB="080017001f000000050014000100000008000400", @ANYRES32=r4, @ANYBLOB="14000500fc000000ffffffff000000000000000177d5635ebf8b1a00ae79c5c6f209c6272f144b4d39a66b00381efe9af36ff0a8507323254140b56c9a6673ff00000000000000953a5b28cc5ee0e162063d06c58f9acffdfd6568435732f29f69f2db4ab3e02cb004ca063a64666e6b046f8e8bd61484c590f580bd14fc6af7bdd69ad45bbcec6302ae2402a29c3080c290c8225b75f2cc08430233c0eb593125d2ad423e5bb099b3213e122c6d53ace10f9c1db641cc30333de3ee4f490c19892e8b653fa10ebccbf17e0464df2766b9282e0000000000000000"], 0x58}, 0x1, 0x0, 0x0, 0x40080}, 0x4000885) 03:35:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc18}]}, 0x28}}, 0x0) 03:35:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xc00) 03:35:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0xa100}], 0xbb, 0x0, 0x0) 03:35:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x321000, 0x10) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="08001b0042f46db42ca3f7370000b4b5fb5a6201bc0b3488ddf3a7f12038fad6d6c1bfe5ebb61a28084091b16a31ace232697defa52b02592c73d4726b75f63bf414b134dd40d0d03e41d5439f376e0c4258b0fcc8053e32bc9b9d081164ee9bb1b785b64dd510eb036db5251be6cda9f30ea74974b3f70eb52cada2e1075e22edc61702805ab1f53ee82dcbb9b7"], 0x30}}, 0x0) 03:35:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc1c}]}, 0x28}}, 0x0) 03:35:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0xa70d}], 0xbb, 0x0, 0x0) 03:35:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xf00) 03:35:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x1) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc20}]}, 0x28}}, 0x0) 03:35:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0xe105}], 0xbb, 0x0, 0x0) 03:35:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x2100) 03:35:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x8) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x8) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000), 0x8) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000), 0x8) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000), 0x8) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) sendto$unix(r0, &(0x7f0000000200)="40d458eb0a56c48b46a13711f01dc96d447d8367ffefd0865e249ac9424b313032865e76237ae7e97083a2656c25cfef066255c745e39f14221fae9b3ffe658d94ad7368b6fcbc58e090d9c5a13d82ff7b2b6b980cf11c61ad971a185dd5a259da60dc1069e8b89633d12d380d5bcb796d8bf7eab42f3c9f6a8c06685b33ebb4c31e776b36bf09f275371614f8ad54caa304d3763d971cf2a2e63d70d74748faabe4422f58", 0xa5, 0x40010, 0x0, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="31ce587e4023bd25be01a0efc4e1fffffeffffffff"], &(0x7f00000004c0)=""/58, 0x3a) socket$nl_route(0x10, 0x3, 0x0) 03:35:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc24}]}, 0x28}}, 0x0) 03:35:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x20003000}], 0xbb, 0x0, 0x0) 03:35:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x33df) 03:35:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc28}]}, 0x28}}, 0x0) 03:35:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = gettid() r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0xffffffffffffffff, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r4, 0x6, 0x9, 0x0, &(0x7f0000000080)) r5 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000009840), 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000009880)='./file0\x00', 0x6000, 0x200, &(0x7f00000098c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000009a00)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0\x00'}) r8 = gettid() perf_event_open(&(0x7f0000000080)={0x5b437f70b7c6f45d, 0x80, 0x7, 0x20, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x4, @perf_config_ext={0x2, 0x20}, 0x8000, 0xfffffffffffeffff, 0x0, 0x1, 0x1000, 0x9, 0x2, 0x0, 0x5, 0x0, 0x66cc}, r8, 0xa, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000009bc0)={0x0, 0x0}, &(0x7f0000009c00)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009c80)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="8ff350be9a5ac01f40d537b5cb42d417744495b290229d66bcec4b90bd8fdb3fc6f3347e9ad62f0794f125ca6b4ede9e92f38f82bf67568fd9e6d18106d94ef67f9fa6a90ee9ba6bf5f3bd9f697c3f72f6ed221ae50cd4a6a8bd1d4dd015f23dac3f90561b10730d74a564a2b9b32d36a6abcea932273da391d16a37912e5e8daf35e5a6d32a689100", 0x89}], 0x1, &(0x7f0000000340)=[@rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}], 0xd0, 0x8000}}, {{&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003900)=[{&(0x7f00000004c0)="30826136e5d1a5c490ea0b3c8813174cbfc6f19d015987a2839ed573c90e17d6e27a12ca8d39f7e52495056a3ee46ff1197ab43bafb9b11f1ae272e52b3a", 0x3e}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="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", 0x1000}, {&(0x7f0000002500)="18a959e4bd3e4a35c9da0f4169d3e891f6417b9ec99acafdad3887620dad030d269827634972993a522aa7cb5764592d5b5ce9c1f5ece57c371dd282c6e54d12fa672d2a038c5d7917261f0228321c833ab055c51602d9cd5b5a286cf6bc7a828ea0c6bbf4e2daa9414ca8dca6ddbd553494f8fd1f5b02e771bbfc8b58dc85f7ab8db5b945358bd57cf3e60bf816e6057905ac3e3cb8753e823bdc497a7f13defe2064e6b081cf56746ffe35370975b2d00a53acd1b149c35decc39c88914b89", 0xc0}, {&(0x7f00000025c0)="ea89843a714e35bae2d647da19d18de0402bfadae0c5eb75896e8bfdf14e5263578a94ff633bd4d0a3f2b77bee06d46d18b8eab7e2905bb868cd837d4f78126878873be8f68cb186f642c5cc46b15a78e437c393f2fbf7e26676c039c671683b03597a306950f552ba399a66792fd9d3afdf13d537c8748e88e1f1ad39bd77961a3a7ab18fc66514d0b3ad5dbd6197a5bc6fdddd0ad3c938adaf76239bccfa6f803a4b7d439cb0e8720b18f1eb4c1df9d6d3814da6c85727daf5eba01d6c8cf772e4955d6e2a1a28e18c4442e922b9df081d006cf04a7060bd2e6fb2b6ac9c06a9ede1e356acc42e083ce3219f07457d6746502250244047a1de3b659215501a32c92fa7b5f2c6df285192c0898311b1cc9fc18d25f4398d9a545287c60088004986dd8c3889f08edf43e2e62332109137e8f92a0526feae124a292955b1cf835f014e25e1c8fc7cef48bc9b42306bc9ada25a352e7e98607aac89556ff2620b7f4734218b06ae70f8f84705adcb080a7fbcfcc72cfcd85dcfb9e3c95655464e85302c4e8ec0fa62d474ab167b3f102158fe5e521adcaf48b782fd6d7566bb7b63faba12a6e5e30aa28097071adc4798381b04482b7b2313f61f0f251783748142486cbca0d070237f3e4e18fb79554dec5eca11958cfc9cefc6da563d514fe3e2947b7a83176a7289ef4bf2ed6601621dacc6ae3eb1d53024c5b766b03fcd01714921fa649dcd1cee7e9b919a270e4d3a8ecb171871ee523804d78a6c1639caf7022b970a18db4485b03a5700ccadc63d02fb1b0e73653a095e56c1e44496f641b8b74f9e742433e61cbfdbf95f047b54114a1282cd8c990481944668315a555231dccc8464397a37c187a327fdd2a336792214e7767c37de84f53854ff2e5f9513bc5f0201cd7c508734d1d02ac25f0670e70fdee979632f57f1fa8f8da888a993e755dfcc62a58b7c4e431fcfdfa0b2268eac0d9dc7498163ba5e7883184af2b24c6d9920cdde4d90868955f1562360561da484145ef80470ec87d67310708767105ad8fba1cd509d2497b8d4f70c53c071854d4d501722ff13e6bee7d5829c68290a4aef9a473c3db6a2b2cd38a3d5f397c7c3bcc5a812da1fb9fd261e8032cfeb3941329ad0de7c47c1ac25f641e7f76e1ce27a799873f463f0049dd256b41ee552c8d2a26d77ec80f5c82ac2fe3c92db0874dfbcc511228152f14a7a374584b8ff0449adb4eb97411eca79e327f514bf02c0bdf1d3ce89484ea3b0fe1c2a13065a9ed7055b7ac16a196a649066488e3dc28601b0dfc679b08983a0ad22605495c9d7da6568abecf3342afa56552a03c816d3772ddd5214d2be3682da5ee7e64719b3bc0ec041c8686729808d9707ee7a796a727e9d97305adcde9b3fdc538ca4ac657f77336cb08767c7e694686fe6b92b378844584f4e0a99fd74505a070dd2186b3157f398b9072dc3067f0e9ea1b154866e0290674b63ce26264e7bec42af379733df44e661f21a3253730adffde181c63ecf8996b9d38412fc09d9d66272f2334ced0287bee750570600ef037bcd24039e03c6332e523035962c34475e8c40a642fcab44adb31c790097b4c5109bd070f39be6b9c221ad350444db2920abc91a9b01768408e1491a51773b1e262f14ce03120ebad0824f5d015bd21e00dedc36aa3597fb8555aae9881b0233aa66189763746ae940335c658550a98707cf4d7b0df1649ed9b7f9bb082511d80afb2f902ff3ed443701bd6758e022aac44e7d7a37eece24cc012b07a1fb454c3b9b8295dee2a68a5eab17f56f6f3efb573b98f79a2dcfd59e922969dc14038095bae0b6337ad856531780b0db5071c1ea0f4b75544d4f21eed4b8bf7c4aaed10ae6344cf62be4b5d3e9c98e43c4fb71f058ba7d670b2027ba508c590a095c9948e8c03f84640f019aa5a6382c889d582c8518139de64004ead105fd6d390127df254ffc6cea0e856367b1429780ca84b14add030ac37a620083ced32b452cd2973c8d449433746be7f9e6e7eca82b5a0478f7e7707189fa3bc64b7920009764f90953bcf37047b97dd847f463bf6186ebaa6b6144175f012b5efdd649ac45bd4609900a6ce1c0eee7275ba9b9255024de649907958b6eafae506c21f7be29b1e886d47e2b17b448d45684cbb4c35b9ae204725dfb478e937e92d6124cc59941c46e0f1024777fe4a75dc8ac433bfce9c8af6e9cc5f3bca1bfbb41003e7258603b637abdf3f1e47f7ccab354fe599e3b75b64bb3c32997953d3ab0b022ab33e22b1c8f42c1c05b6e31544e01aa64106a6c6054f19677fcc909c868acb73b263e09810b87152e4d8b67b8f72c4be92643d716bd82dbb0d16f787e9a05b6a260c76633111cd2945a34368596cadc041c8f448a70da3296bb33523750ece7dcaba628287b96eb37a4b74d6bfbe1a55447f5f039b095b89eb5f56c9952478c18857222bc1a5efd2bd02123d893021a24d5666910242b0be365c8d03042ac21f5437653f3339d19a3463f32feae6e7dc9dd2990c4bc7fb3c2123a9d7f3f0ce7b7f60600fa9bd6d16531cec6daf85c62f54ca11111e91c018915599ba118d1d1551306e5f73f9e90b238f4a27c2299e1611d1caeb8ddb1abc215b180a7d2544f44a5dad6f84b2a966ab4f5405430201f61a78b1dc41329709095fa005bbd2a15ade5a6254c16876c6fce4fe1897844fd29fc114e54f75fd4654f3b6020777477faba302a0c63b3adc066a458410cddc9b214511f21b07827f2bb1584c3dfa0d4399d647805c9f43e429856d9f8707c758534d82c413c197c2b3b8e895368691ba77b261b40361c80c624185c1edceac8569c37bdffbf2522788ed1a5f1acbe4747f76da2f655b85f804f4cc1b7182e554c5048ee4bdaa40ea29e81057d77ce6e152ed732e381b0f0fa7b9013e473a3cc483de2b06b5ce0ee30675c2cc4b04108a8b293aaa11c56fdc178fc81f74bd1f62179f26b7fffd42afe61e7440f9e1a580a1305a2833709c8600aea0705738717abde88de4956467124fd338817667ce5b9a26bf92dd438a1f0753d57c90701661297ad5593e9db7b28118d0b228ab7b6558a3774c812eb51b9e4cb06137476cd153530e675bf27dd4555a3df09f12f88fd94406daf6372388361ed69d2c48904e4a409c4ccf6606c3b0ba11e42a427b89cc33d5a37c95247cab7a3478080b45241ea533dd8c312cc51369c97f623928c281e036ace1b92ba7cacc4573bbc88c363d63cf713d1874e1ab4a18412a3000a00f378716ae1c6dbb35aeced015f1d22b50b1f10e279394fa5efe829652cffbc51ba5f9fcbca590bbf528a35c0c6cb65de0e1ba3cecd283a638a492dc3a46cc73a98cde59e1c1877713d93e5f37d1be43534a3ca5f02eacbdb9ba86947115a3e0eb2df827a2027aca3f2c30d8073c972325ab47de24ad6c2b64a10de6f9ad95679197da59432798eb31db30a2dbc6b18d47139f0527abead676b6573d867c4bb73ef0c29329f5691923b96f8102910902f88b20481d9d403ce7d624927fdda37ea8ac956db5462d03a8bed2b9786a251b4ad119251979eb7970517c3bff4f8af0d71145fa18c71d232f58fdda3d4ec44a1793d241b4643857691318736db90c261c84f41c1070fcae7718d9af48f18853fd81fbaad845df11742e33f566b7ac49edc265f47fff90073be4c06064ff4565889775f5ef1ecd19990f77ce17e0e135c4cb112f9872ca889b04c0046f2f9b817828619c0432bbb16f243115dc1eb30120c67874b0ff2e5476cae8dddebdda37bf0624bde5b0e5813ff1f88bec17c7225c50456993948973bb3cb082a4191fbd06b84fca4685c78f09a61c3a94714762bd913bc275b421eb851726ae65f7f709afbce567f79117a8fc5c3ad5f8c0fc9339b81dfd8ba7ac4780bd42b512963ecce97e05d3fb7cf8be1c7960fb54e3df7dbec21daa43ce9579c620c2b3836c20de53d578a1fc869b627d6d598ced35dead9e1e7ed878d7fc6e664fb044cc0e075666b8d1c3722734ad6898fcf3f1c47b5497c325683ffcc27a9bb8a64c00bbdbbaff11afe2259cb4a371055432998dc1d745bf4457bf1ab697e5ee733386a4272ea9943c5e481d6475d2b345ea446fdf9ac90f3f1fa861edf1502e045707ae4a13b311d4900845f98d52f9614b9dda72f5ddb902e153867cdaa9d35df4e8a275a804169d323c173ab2284e18fac9609cb939d512319bde0cdb684805540c42b49aacfa472bf12261eba61bbb97c409d8d22797d4977a625b56d53d3432028ff4124e8196429af7c310e89ea44c52b7fdd054b3d748fb94683a895d2c3cc2167116815dc745463ea50c202d6e592fdf135fdf2678a2a7559fcf2bdcee5c1df648c728be668c65c904d4348ad230126f7caff30c1687099f2aed6c3b42656e16efb625b0f84ee21b7632dc07f4958b8bacb2dc451bb8a932cfe40c6edf91716dd7d96b27f0f8cbe7622fbafe61e0fc92da33a39da05ccf44bbdb8ebc529edbdcc3cd2cb4aa17558783622f94236b0ea3f837e62916448fa85d35622359c63ad33ffb8d53aee1f020a015ea119175e5d9d84a63254625a506afc5b6e852781a54f204e1ab611664478f6c0fa95dd172bf53e561156ef82b2f86d8b69ee99a45ae3197e85c55ca485fe39b58ddb92059d9a2407283eb29d7246b8e5da911486562650498a48e2ddeb32361e0a587b0be09792eb7cd104cf9782a2a2356cbc45116e8b31cc49e6033cf0e9c2b66b2d72d0a89728f36abf22412009591874ff4c6513c562e08d01204025d3756cd3697594d84ae78435b4c0d77953c63aecb77f1bc69f09854e7083f44a54d4165fbccc7401b65f7d9f079d0c855d86f6b332deef3e930fc7551127403f214648bb0446357215b90522cda0418021f1ac5d02416ea6ee749860b3be1444bce3ac655f353fcaa85bac1bb6e0cb6b885f46d45282a0cf871deaf738e33097c82890cc296d7e9ffbb0420bb19885248ef8a03f0658fbcd316f735b5774e24ace9d217da7764b8941f40eb3db940b53a9d7ea6c2a1c2cf71b6571fc6274101d683cc6693dab8f22baed9aae619fbdb8e8ba9e5f9840362a42618fee9117f6b63c045deee9fde29f9105ae15c08c29f15d3c96f98c557112cd7f4158946e9f722f92435d392acc431911a0541cbb66c4cd69472f9f8adca5415fc4f88917ab283c559c1f7eb57150c492700f79e6ddf13d12a2fb209b3101734146e665632e5ac9a6331ab559d5ba3ec3d030c6ab1aee15e4fb6e11e5b430d570c88910ef57a5aee270f6b6bbfb39d3b3c654eb47ea138582d1a57c7612bd615adbbca87457ed66384664e31baf4409c1f7f0c42c2fee50b3edbabae63abb72c6fbe3810a10bc46873bd7eff0977e4b9301d7a451f9b5a0f0d3bde055aa4b42162ffdd3dd9f0cb24af102cb87bab09e4eb9d457b2df0d79d7c2edebe3fbb071d5a4ac15a618b479e2507c76c435748054b87f7143106441a5f2f79343e0fc1d16ca0bba468b62a6eb1728ff29f0951af5bdf4f506b55757092358e390511c8ca459823108ee9de2d7c1c23a7f226f91bd31c9c821994eca71c258649024fc8190db5612b5d6c6b3f37dcf6ef144c82967ac0608a78437b3e11a33661b6c9b1d1e51d25107d0ee6481b765e4a5bdff1859a67d4ae868ab6be9ce2875d1819b42580237d7e0923ee89be18d72f177c81ddffae359b4fab4735deb7842d35a4353d1170917056b5035986ef100ef584f7477e9c983c38b31adf3e53e185e9786f3e4f4", 0x1000}, {&(0x7f00000035c0)="96b6994c5632f2202052a7ef32e5dd9e49276cf81f43846c5642ce8845f2b7874aa7350aa4eb5b6983f760b3e055449bcaa6ad192256d5719267e4f3b00ff3538dde0162239a6ddfcd22f02bcaa5a0c59a3439915841452b210cfb8bf21f6805241e941e73610472b30b0a2752bb21efc0d65781365a0271aa65d120acc2e0bed7d6522860ac564730b50230a59be33ca7340249ed0925df0411486bbf4174a719b3c9f73e545d335e86adbd736d8eb7cb9e57acb157efc04b", 0xb9}, {&(0x7f0000003680)="523095f510a40008084ddee722452eb2677b1db5d2cf508a970229a3f2eb0a64c56046880ec35ba777a1d2188e98062402ddb531f38035300780d7b5202dc03c01fab8db6839141ee99bf914976a39b938e0fc80cc1b386af2d2a905de81ad82acda5a348baf60b25d035f33b16003c6780a1ee6769a5a22c45ed19525f5be5c96625f5457112ee8f012476cf0defbe5cb5560ed082ecfd42004ef172b103920289d833fd24c7f2a9323c9ffdcbf5ab45f49d248139ef5560c5e44ff2324e0aed3686139a339b9a7fead1f38e62ab989a01d05f022187c441ff4ef36", 0xdc}, {&(0x7f0000003780)="cd3c5fe26e9e4d1f1a72ec3316751e07065fb4472aff71bded5022e5ae4feb2a073fa4757c54ae75196eecd71230ddbc8fa51a512e43db16c3616dde02e4a3d609097a31f47c85c3cd5a06f46d6c1c52b66ace07cbbfc2a576dadebc3fb4abb757f753e5861f5802ed95eb2594b4388766ba4ce22186d423e3475f6d7bb0dac33bf010c18fbeb4b71af764c421cefc61a766068e54e9fe0d4b2ba0d7ba7604321ad0900f8937ab32c914c54e2ae5996da7251a25eb86040413260970def3e4c2f09b610ef6a3a27a250713", 0xcb}, {&(0x7f0000003880)="d2ff6b05063bcc673f459f6e17902041ab47a0a617d11cef48a8994168c8c8f684d8c10417032ce05053dcfdd31fb2a0cb1d6a98947193cf247b9fdf8cd3bd5934799573dc257ca3d8df775cb718542270a9fa26c8ba6c489390304e549599b95a137dc261933653ac30", 0x6a}], 0x9, 0x0, 0x0, 0xc0}}, {{&(0x7f00000039c0)=@file={0x2, './file0\x00'}, 0x6e, &(0x7f0000003b40)=[{&(0x7f0000003a40)="b9e4ca37111bc561682ac5850bb1257704b34485ac71941315da974f41f3c687dc2c3025468fc1de8d2ab70ec5935f0e3f4f1d2008b60cd8602707ac8e9d1744a685edfdb865527d2934f886c2030a6cdb3a49eb7b6e58a5d66fa1def58e259b23edaf1f1e08492d9dfad098e1db12dc0c6df8b01903921755ab455f3ac67cc7f1a3a3ce4b41804471", 0x89}, {&(0x7f0000003b00)}], 0x2, &(0x7f0000004080)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="7f000000"], 0xe8, 0x4008010}}, {{0x0, 0x0, &(0x7f0000005240)=[{&(0x7f0000004180)="d70464127d7bc62772799333aca63c8df66aea847f8b3aa6a9ee4c9b0523e5068915c48c6e7dd863275d139a091c12a68e37fa62e9143f23a7cba6b07f4dba98f05c0a6e14755098e24d7cf4fbdebd461a8c65654a829529b20552bcf87a1a6e4696d7e1c00a95cf460e08169d41de5b359bee8bc9888e14eecb342aa7fa0f119bd6a33d584c87e1d9598fad330ba7a72e82991d009a703b3bc61ba5653dc91d6ebf372323", 0xa5}, {&(0x7f0000004240)="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", 0x1000}], 0x2, 0x0, 0x0, 0x4840}}, {{&(0x7f0000005280)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000005640)=[{&(0x7f0000005300)="a26cce8e9b3503bd1f2cf23bfbedb41fa3a6c94b0adeddb87d96a3b7f4c2bda6823ce71b779bb0c3a29d66939860cff6d61fe6092854bae55ad234c7366aa04aa57b85932354f5d4ab333030c213a602a2cf32cff6da1612694383c1cda0fefbf633e45869ab026b9b3babca0e6f93d79d135407de01f856f1172ef103f66538575a3f922d226096f513d1e5daeca6aa4d342054e0923f24770aba77339a01712526cebe0b197467f60d", 0xaa}, {&(0x7f00000053c0)="d4c930f65de27766e5c4ffeecb60b2bd7c53d77ee8b645e49822de75d6e4bc72cef2621891d2667d51e41fa8b808685ee91f9f71fc57c366456b472d81b47702701ea453f3547e639ba564a73ee8fd7a413d854ca218f024fe864bb45564647459cc76534952f1f4be6063640897fbb87530bc52d674119454d70a25fd59d9", 0x7f}, {&(0x7f0000005440)="4812990174e779e377dadd3e5727c128c579adb1d5b9088e6a6b305891742383d736f54e3afeda4c2cde4418803e121c8f31d1606685d54fc88fc3cc652401e1d7e43ec1458266b5aaefa16aee2df4678301a04e59faed9d85110018fde3b7ee2231eaada88f5d156e5ad3d3c121b98389579bed1355076d114ffe006c6f60a6fd03d0c620f0ac92c77b848b3b38c7772e37641f12d3c94a1212518a98c322b5f1f3e0e6ac4b8114609114032ae6967327b00307", 0xb4}, {&(0x7f0000005500)="b46e7e5e13d4fb37772637187bf3923b30884071d30e0ed5ce14fc4392d5a91c648514c83fbdd09a3e9c411ba1571aafa4c6320f9d3b4a51f0e3975eb39bd9d706f35f24acb74bcada5a701ce820f6e45c94c1d52838786887d4def8e799541bfe40c0945b6c13e897ac54db58408ac90e30eeca76ef8bcdcd25430484ea7002976b59d17f136df331c035fb1c6a45628ecd5f327bc128e1a76414cb5938e0322a57485635024efcea3da2e8a977aeb4d3f85746c84f678302949db77ed1fd8431c1a18b0495d5c8bb2659896be3ee6b19d755d2c0ce0c6e5c9c", 0xda}, {&(0x7f0000005600)="2fcbf3172e02264e99aacc9e14418c6cfd13cc203c2940428e8e285b0d4c327313ceac180a7362f9dd", 0x29}], 0x5, &(0x7f0000009a40)=ANY=[@ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000e91b000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0xee01, @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00'], 0xb0, 0x40}}, {{0x0, 0x0, &(0x7f0000009b80)=[{&(0x7f0000009b00)="7a143d1c4bbdb4686222a376d79c3f3f22a0904c849a93199888bef7fdf73f26ec63788092c99fe718c35f9848913f0289c6abbc49fc10fe6a0919afa4bc6ab088c16ce73b7386030c69ac72", 0x4c}], 0x1, &(0x7f0000009c40)=[@cred={{0x1c, 0x1, 0x2, {r8, r9}}}], 0x20, 0x50}}], 0x6, 0x4000000) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r10, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r10, 0x6, 0x9, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000000)={'bond0\x00'}) 03:35:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x7ffff000}], 0xbb, 0x0, 0x0) 03:35:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x880}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000), 0x4) 03:35:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc2c}]}, 0x28}}, 0x0) 03:35:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x4788) 03:35:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0xffffffffffffffff}], 0xbb, 0x0, 0x0) 03:35:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4}, 0x0, 0xfffffdffffffbfff, 0xffffffffffffffff, 0x8) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=@ipv6_newaddr={0x8c, 0x14, 0x100, 0x70bd2b, 0x25dfdbff, {0xa, 0x18, 0x80, 0xc8, r3}, [@IFA_ADDRESS={0x14, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}}, @IFA_CACHEINFO={0x14, 0x6, {0x5, 0x0, 0x6, 0x5}}, @IFA_LOCAL={0x14, 0x2, @rand_addr=' \x01\x00'}, @IFA_FLAGS={0x8, 0x8, 0x107}, @IFA_CACHEINFO={0x14, 0x6, {0x20, 0x101, 0x4, 0x7f}}, @IFA_LOCAL={0x14, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0xc9}]}, 0x8c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=@ipv4_newnexthop={0x34, 0x68, 0x200, 0x70bd28, 0x25dfdbfc, {0x2, 0x0, 0x3, 0x0, 0x20}, [@NHA_FDB={0x4}, @NHA_ID={0x8, 0x1, 0x1}, @NHA_ID={0x8, 0x1, 0x1}, @NHA_OIF={0x8, 0x5, r5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40054}, 0x4000000) 03:35:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc30}]}, 0x28}}, 0x0) 03:35:05 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) r3 = socket(0x10, 0x80002, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000440), 0x82000, 0x0) r8 = socket$xdp(0x2c, 0x3, 0x0) syz_io_uring_submit(r6, r5, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x4, 0x0, @fd=r8, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000493c0)={0x0, 0x0, "418bf1b4dbc3275c5d6d7bb0c18b255e8f2f0ecee888452395468991d04f1782f1dce943c4e5fe24392ca8ea43a5d9006f0585262ca3acd3c46e26244189dd5b8a371856beb97ace2ada5d4f3ea46d9be24ff3ddcd9804ec618b8649827f99c65adc7b158f1bb3abec1559324a009699170079c2448bda0573089aedf040b667c25dc8cab9658b76c21dbafb3d31e8bd77af368ac021487d6602b8a0d45215cf691d38dd6bf49ce6e0b12eb9fe40ec3e6835d161ff06f9bd53acc3e32de9d17d82060080eff9bbc31ed5456035e3cf7b8aa6550100ef3159d081a733800c8d6a8bbe90b8d1e6dadbf2d913a6c9e4829d38b5b08608b002cda19f6676fe0efd28", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r7, 0xd000943d, &(0x7f000004a3c0)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x0, "ebb38a62d00e7e"}) sendmsg$NL80211_CMD_SET_COALESCE(r3, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1ad5a4d0ad8fe763972a0bade0fc8f6c1ae4c395ac824070e94eb9288f882d47adc16d5fc31b606072a47a4e1f9a54035eafb978a81b51d783d46c1808458c6aa46fd4be1253bbe85ca8c90af918d73ce3e793f671b5c1f1d123f018aa29e390a2856b761889f7bbdcc54c5a7d5881324be5b1654b20ef3ac784c3a5f37ca8f6f46d2bbbb9cb26547ed6f2922435c2c1ee5a1bba354ca2eed1b88d393d0dc8eba16bc60acf64a9a8b55ca1ed176d5ec62c7265187cf1d630fa7ac214ffd86c593b3bb07d1814052830999f9711c70a86", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c70cf4332c14f6e2c2abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f90327d6216e9760fcd648fa65655768fc440a61be189e36e2f665b20a01dd1e2c3be9c9a6964741360a8197159a93627c134fabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4cda923", @ANYRES32=r3, @ANYRES16=r2, @ANYRESOCT=r3, @ANYRES32=r5, @ANYRES64=r6, @ANYBLOB="493c9d23e4857d971ef801d0bdcd796b3fcaac9cc831ae8bcbcc6d4113d00413bc2ab67e298e6053a9cbe2ab654a12449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ec0b74ba8792b4060b897ddf1d45bd20c0dfdf8bf1c0be232af94932a264e8fe4702fd3184e4affc309284702408c989eb0188ad6222709ec179fccf7bc51a68"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) syz_io_uring_submit(r0, r5, &(0x7f0000000040)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x1) 03:35:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x8, 0x0, 0x0) 03:35:05 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_serviced\x00', 0x0, 0x0) readahead(r0, 0x5, 0x1) preadv(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000080)=0x3) 03:35:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x4888) 03:35:05 executing program 4: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000003780)=ANY=[@ANYBLOB="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"], 0x106, 0x1) chmod(&(0x7f0000000040)='./file0\x00', 0xa) mknodat$null(0xffffffffffffffff, &(0x7f0000003640)='./file0\x00', 0x8000, 0x103) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000032c0)={0x0, 0x0}) r2 = perf_event_open(&(0x7f0000003240)={0x0, 0x80, 0x7, 0xf1, 0x3, 0x64, 0x0, 0x10000, 0x5120, 0x1e, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_config_ext={0x1, 0x5e}, 0x20, 0x1, 0x80000001, 0x6, 0xba4, 0x5, 0xc33, 0x0, 0x6, 0x0, 0x9}, r1, 0x0, r0, 0xb) syz_open_dev$sg(&(0x7f0000000180), 0x3, 0x800) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="081f4e6695936f73782e4000"], &(0x7f00000004c0)=""/58, 0x3a) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @multicast1, @dev}, &(0x7f0000000240)=0xc) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003340)=[{{&(0x7f0000000440), 0x6e, &(0x7f0000001a40)=[{&(0x7f0000000640)=""/101, 0x65}, {&(0x7f00000002c0)=""/7, 0x7}, {&(0x7f0000000340)=""/40, 0x28}, {&(0x7f00000006c0)=""/104, 0x68}, {&(0x7f0000000740)=""/222, 0xde}, {&(0x7f0000000840)=""/86, 0x56}, {&(0x7f00000008c0)=""/184, 0xb8}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/150, 0x96}], 0x9}}, {{&(0x7f0000001b00)=@abs, 0x6e, &(0x7f0000001e00)=[{&(0x7f0000001b80)=""/5, 0x5}, {&(0x7f0000001bc0)=""/239, 0xef}, {&(0x7f0000001cc0)=""/14, 0xe}, {&(0x7f0000001d00)=""/111, 0x6f}, {&(0x7f0000003700)=""/122, 0x7a}], 0x5, &(0x7f0000001e80)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}}, {{&(0x7f0000001f80), 0x6e, &(0x7f0000003200)=[{&(0x7f0000002000)=""/142, 0x8e}, {&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f00000030c0)=""/82, 0x52}, {&(0x7f0000003140)=""/168, 0xa8}], 0x4, &(0x7f0000003540)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000020001c00090000000000010000000200000040537b9c3677a96e8e88156ac4bef1b21468", @ANYRESOCT=r2, @ANYRES64=r4, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xd0}}], 0x3, 0x2100, &(0x7f0000003400)) sendmsg$nl_route_sched(r5, &(0x7f0000003500)={&(0x7f0000003440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000034c0)={&(0x7f0000003480)=ANY=[@ANYBLOB="3c000000650010002dbd7000fcdbdf2500000000", @ANYRES32=r4, @ANYBLOB="070001000c000c001300060008000b000000000000ffffff"], 0x3c}, 0x1, 0x0, 0x0, 0x4004040}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getroute={0x14, 0x1a, 0x8, 0x70bd27, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}}, 0x20000010) r6 = open(&(0x7f0000003680)='./file0\x00', 0x420083, 0x40) fspick(r6, &(0x7f00000036c0)='./file0\x00', 0x0) 03:35:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0xfffffffc, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc34}]}, 0x28}}, 0x0) 03:35:05 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ef8000/0x1000)=nil, 0x1000, 0x2000000, 0x8010, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000), 0x4) r4 = socket(0x10, 0x80002, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1ad5a4d0ad8fe763972a0bade0fc8f6c1ae4c395ac824070e94eb9288f882d47adc16d5fc31b606072a47a4e1f9a54035eafb978a81b51d783d46c1808458c6aa46fd4be1253bbe85ca8c90af918d73ce3e793f671b5c1f1d123f018aa29e390a2856b761889f7bbdcc54c5a7d5881324be5b1654b20ef3ac784c3a5f37ca8f6f46d2bbbb9cb26547ed6f2922435c2c1ee5a1bba354ca2eed1b88d393d0dc8eba16bc60acf64a9a8b55ca1ed176d5ec62c7265187cf1d630fa7ac214ffd86c593b3bb07d1814052830999f9711c70a86", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c70cf4332c14f6e2c2abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f90327d6216e9760fcd648fa65655768fc440a61be189e36e2f665b20a01dd1e2c3be9c9a6964741360a8197159a93627c134fabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4cda923", @ANYRES32=r4, @ANYRES16=r3, @ANYRESOCT=r4, @ANYRES32=r6, @ANYRES64=r7, @ANYBLOB="493c9d23e4857d971ef801d0bdcd796b3fcaac9cc831ae8bcbcc6d4113d00413bc2ab67e298e6053a9cbe2ab654a12449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ec0b74ba8792b4060b8949"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) syz_io_uring_submit(r1, r6, &(0x7f0000000040)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0xc638) 03:35:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) 03:35:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000004}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x50, 0x29, 0x1, 0x70bd25, 0x0, {0x0, 0x0, 0x0, 0x0, {0x2, 0x8}, {0x0, 0x6}, {0xfff3, 0x7}}, [@TCA_RATE={0x6, 0x5, {0x2, 0x2}}, @tclass_kind_options=@c_clsact={0xb}, @TCA_RATE={0x6, 0x5, {0xcf, 0x1f}}, @TCA_RATE={0x6, 0x5, {0x40, 0x5d}}, @TCA_RATE={0x6, 0x5, {0x7, 0x1}}]}, 0x50}}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv6_getanyicast={0x14, 0x3e, 0x1, 0x70bd25, 0x25dfdbff, {}, [""]}, 0x14}}, 0x0) 03:35:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000240)='./file0\x00', 0x12a) acct(&(0x7f0000000200)='./file0\x00') perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x1f, 0xff, 0x4, 0x0, 0x0, 0x6, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8e6, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x6cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x6, 0x20}) 03:35:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x5865) 03:35:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc38}]}, 0x28}}, 0x0) 03:35:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x2, 0x0) 03:35:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800010c12e60ced310000000052ff4d01af2091cc1da8ca10037732e01f03b7c2f9cd2e8de3233ddc21cba0038ba601a487389b25eacc46750c8458b68e9ff02c1c4e9422aaf11fc8e7ecb293b85b7d95ee987a93fe9d83b949bd6ec90684ca95b64da05a7d0e763a77940427e1c6246bfd2cb61285bad0d162275b", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}}, 0x0) 03:35:05 executing program 5: r0 = shmget(0x2, 0x4000, 0x400, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x2000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000a00)={0x13, 0x10, 0xfa00, {&(0x7f00000007c0), r2, 0x2}}, 0x18) r3 = dup2(r1, r1) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xfffffff9, @mcast2, 0x4}, {0xa, 0x4e23, 0x1, @loopback, 0x10001}, r2, 0x78}}, 0x48) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r4, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r5, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x9d, @mcast2, 0xcb7c9a9}, {0xa, 0x4e23, 0x80000001, @remote, 0x8}, r2, 0x1000}}, 0x48) 03:35:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x30004}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc3c}]}, 0x28}}, 0x0) 03:35:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x6000) 03:35:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20f20}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x0) 03:35:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x3, 0x0) 03:35:05 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = socket(0x10, 0x80002, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1ad5a4d0ad8fe763972a0bade0fc8f6c1ae4c395ac824070e94eb9288f882d47adc16d5fc31b606072a47a4e1f9a54035eafb978a81b51d783d46c1808458c6aa46fd4be1253bbe85ca8c90af918d73ce3e793f671b5c1f1d123f018aa29e390a2856b761889f7bbdcc54c5a7d5881324be5b1654b20ef3ac784c3a5f37ca8f6f46d2bbbb9cb26547ed6f2922435c2c1ee5a1bba354ca2eed1b88d393d0dc8eba16bc60acf64a9a8b55ca1ed176d5ec62c7265187cf1d630fa7ac214ffd86c593b3bb07d1814052830999f9711c70a86", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c70cf4332c14f6e2c2abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f90327d6216e9760fcd648fa65655768fc440a61be189e36e2f665b20a01dd1e2c3be9c9a6964741360a8197159a93627c134fabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4cda923", @ANYRES32=r1, @ANYRES16=r0, @ANYRESOCT=r1, @ANYRES32=r3, @ANYRES64=r4, @ANYBLOB="493c9d23e4857d971ef801d0bdcd796b3fcaac9cc831ae8bcbcc6d4113d00413bc2ab67e298e6053a9cbe2ab654a12449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ec0b74ba8792b4060b8949"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f00000001c0)=@IORING_OP_STATX={0x15, 0xa65046415257a1e5, 0x0, 0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x2, 0x2000}, 0x2) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r6, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc40}]}, 0x28}}, 0x0) 03:35:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000200)=@sha1={0x1, "f7d0da6c44ac7536d05db0d76f67f2855f7a4c3a"}, 0x15, 0x1) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x6558) 03:35:06 executing program 3: keyctl$setperm(0x5, 0x0, 0x22800) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000002000005c0500000000000000007fff5c20a2f673393ebbc24bd105517fca209e4a36865724f987126e4bb6e2a73912a42f36368a94cc1e0c604153f63249ceac776eee7bfc1bd7fd37dc4750dc0248868c3903c31ae1edf61d7f0694e3bbc7aea68665fd8d58ad5e711bd17830c8ee67d30d4de98690253a0fb3e3641dcd164674d35a27225638fe0834f571b8f0411dffa1b99481ebd065d2182d93db94d7b69810fc"], 0x28}}, 0x0) 03:35:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x4, 0x0) 03:35:06 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') io_uring_enter(r0, 0x6678, 0xef1b, 0x0, &(0x7f0000000040)={[0x3ff]}, 0x8) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc44}]}, 0x28}}, 0x0) 03:35:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x1e, &(0x7f00000001c0)={&(0x7f0000000080)=@newlinkprop={0x38, 0x6c, 0x800, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x40, 0x800}, [@IFLA_WEIGHT={0x8, 0xf, 0x6}, @IFLA_LINKMODE={0x5, 0x11, 0x2}, @IFLA_GSO_MAX_SIZE={0x0, 0x29, 0x94e7}]}, 0x38}, 0x1, 0x0, 0x0, 0x801}, 0x0) 03:35:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x248406}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="340000001800000127bd7000fddbdf250200000dfc0100000020000008000b00ffffffff08001900", @ANYRES32=r2, @ANYBLOB="6d37e017784300a5d3"], 0x34}, 0x1, 0x0, 0x0, 0x20000080}, 0x8004) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x5, 0x0) 03:35:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x8100) 03:35:06 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ef3000/0x13000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') 03:35:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc48}]}, 0x28}}, 0x0) 03:35:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x6, 0x0) 03:35:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000080)=@known='security.selinux\x00', &(0x7f00000004c0)=""/47, 0x2f) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="0054da63ac8fe8f8b80000000100000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) 03:35:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000001740)={@remote, @private, 0x0}, &(0x7f0000001780)=0xc) sendmsg$nl_route(r1, &(0x7f0000001840)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001800)={&(0x7f00000017c0)=@dellinkprop={0x28, 0x6d, 0x800, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, 0x40000, 0x2000}, [@IFLA_EVENT={0x8, 0x2c, 0xf47b}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x8c3e1d2554f8e47e) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:06 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4e20, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x4}, 0x1c) r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x20010, r2, 0x0) io_uring_enter(r2, 0x139a, 0x6b3d, 0x2, &(0x7f0000000040)={[0x1ff]}, 0x8) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r4, 0x6, 0x9, 0x0, &(0x7f0000000080)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r4, 0xc0709411, &(0x7f0000000380)=ANY=[@ANYBLOB="8da4b2dfcec3c934d40e0ff85c3ebb9eace8d1cbd09d80c4b5ec4304f191aabd9cde5173f380512948102c07b2d047c797e4653df02dd5abd4e1f3da07ebbfe5b6646e0b02ac8df1f96bf5da82ba56b929392b8f3e8f72c7fc6487d46b5d036c8c3828c1542dc5abd96aa99f206e7fabf5bce24bfc783c6ddef742d28c8d690a390c08a6c2cc907859c6c69c8e3a1ac4b00bf41bdffff5b3bcc7e8fd05b65471a0b5", @ANYRESDEC=r3, @ANYRESDEC=r2, @ANYRESDEC]) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r5 = accept$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @private1}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) 03:35:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x8847) 03:35:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc4c}]}, 0x28}}, 0x0) 03:35:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000280)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x29, 0x9, 0x5, 0x4, 0x44, @loopback, @ipv4={'\x00', '\xff\xff', @remote}, 0x40, 0x7800, 0xffffffff, 0x1}}) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x4200, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getroute={0x14, 0x1a, 0x4, 0x70bd2d, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x40010) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x320}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c000000190000022cbd7000fddbdf05000000000000000580020000060015000200000008000d000700000008000400", @ANYRES32=r1, @ANYBLOB="08000400", @ANYRES32, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40054) 03:35:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x7, 0x0) 03:35:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x5, 0x4, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:06 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) r3 = socket(0x10, 0x80002, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r3, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1ad5a4d0ad8fe763972a0bade0fc8f6c1ae4c395ac824070e94eb9288f882d47adc16d5fc31b606072a47a4e1f9a54035eafb978a81b51d783d46c1808458c6aa46fd4be1253bbe85ca8c90af918d73ce3e793f671b5c1f1d123f018aa29e390a2856b761889f7bbdcc54c5a7d5881324be5b1654b20ef3ac784c3a5f37ca8f6f46d2bbbb9cb26547ed6f2922435c2c1ee5a1bba354ca2eed1b88d393d0dc8eba16bc60acf64a9a8b55ca1ed176d5ec62c7265187cf1d630fa7ac214ffd86c593b3bb07d1814052830999f9711c70a86", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c70cf4332c14f6e2c2abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f90327d6216e9760fcd648fa65655768fc440a61be189e36e2f665b20a01dd1e2c3be9c9a6964741360a8197159a93627c134fabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4cda923", @ANYRES32=r3, @ANYRES16=r2, @ANYRESOCT=r3, @ANYRES32=r5, @ANYRES64=r6, @ANYBLOB="493c9d23e4857d971ef801d0bdcd796b3fcaac9cc831ae8bcbcc6d4113d00413bc2ab67e298e6053a9cbe2ab654a12449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ec0b74ba8792b4060b8949"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) syz_io_uring_submit(r0, r5, &(0x7f0000000040)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x3, 0x0, @fd=r1, 0xc96, 0x0, 0x0, 0x10, 0x1}, 0x8fc) 03:35:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc50}]}, 0x28}}, 0x0) 03:35:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x8848) 03:35:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@gettclass={0x24, 0x2a, 0x0, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0x0, 0x7859e51ced0e5190}, {0xffe0, 0x9}, {0x3, 0x8}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x48000}, 0x20040001) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) sendmsg$nl_route(r5, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0xc008801}, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000480)={0x5, 0x0}, 0x8) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000100000000200030000000085100000070000009500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0xffff, 0xbb, &(0x7f0000000340)=""/187, 0x40f00, 0x14, '\x00', 0x0, 0xe, r7, 0x8, &(0x7f0000000580)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0xd, 0x4, 0x400}, 0x10, r6, r5}, 0x78) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x8, 0x0) 03:35:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r5, r0, 0x0) r6 = dup(r4) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@ipv6_getmulticast={0x14, 0x3a, 0x200, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}}, 0x850) sendmsg$nl_route(r2, &(0x7f0000000580)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000500)=@ipv6_getroute={0x68, 0x1a, 0x200, 0x70bd27, 0x25dfdbfc, {0xa, 0x10, 0x10, 0x5, 0xff, 0x1, 0xfd, 0xa, 0x100}, [@RTA_OIF={0x8, 0x4, r3}, @RTA_IIF={0x8, 0x3, r7}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @LWTUNNEL_IP_TOS={0x5, 0x5, 0x2}}, @RTA_PRIORITY={0x8, 0x6, 0xfffffff7}, @RTA_EXPIRES={0x8, 0x17, 0x10}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x7}, @RTA_EXPIRES={0x8, 0x17, 0x3}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x5}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x7}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000004}, 0x80) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.advise\x00', &(0x7f0000000200)=""/147, 0x93) 03:35:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc54}]}, 0x28}}, 0x0) 03:35:06 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x400}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = gettid() wait4(r0, 0x0, 0x20000000, 0x0) perf_event_open(&(0x7f0000000080)={0x5b437f70b7c6f45d, 0x80, 0x7, 0x20, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x4, @perf_config_ext={0x2, 0x20}, 0x8000, 0xfffffffffffeffff, 0x0, 0x1, 0x1000, 0x9, 0x2, 0x0, 0x5, 0x0, 0x66cc}, r0, 0xa, 0xffffffffffffffff, 0x2) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/rfcomm\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xc305) 03:35:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000080)) ftruncate(r0, 0x101) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x9, 0x0) 03:35:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc58}]}, 0x28}}, 0x0) 03:35:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9c}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x8) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:06 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000002, 0x810, 0xffffffffffffffff, 0x8000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r3, 0x6, 0x9, 0x0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000080)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd_index=0x8, 0x0, 0x0, 0x8, 0xc, 0x0, {0x0, 0x0, r2}}, 0x2) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r4, 0x6, 0x9, 0x0, &(0x7f0000000080)) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f00000000c0)=0x1, 0x4) preadv(r0, &(0x7f00000015c0), 0x0, 0x4800, 0x0) 03:35:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f000000a8c0)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/32, 0x20}, {&(0x7f00000000c0)=""/35, 0x23}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/80, 0x50}], 0x4, &(0x7f0000001280)=""/205, 0xcd}, 0x9c2ed14}, {{&(0x7f0000001380)=@nfc, 0x80, &(0x7f0000001800)=[{&(0x7f0000001400)=""/247, 0xf7}, {&(0x7f0000001500)=""/93, 0x5d}, {&(0x7f0000001580)=""/201, 0xc9}, {&(0x7f0000001680)=""/75, 0x4b}, {&(0x7f0000001700)=""/114, 0x72}, {&(0x7f0000001780)=""/92, 0x5c}], 0x6, &(0x7f0000001880)=""/4096, 0x1000}, 0x1000}, {{0x0, 0x0, &(0x7f0000003a80)=[{&(0x7f0000002880)=""/12, 0xc}, {&(0x7f00000028c0)=""/228, 0xe4}, {&(0x7f00000029c0)=""/181, 0xb5}, {&(0x7f0000002a80)=""/4096, 0x1000}], 0x4, &(0x7f0000003ac0)=""/141, 0x8d}, 0x7}, {{&(0x7f0000003b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000004d80)=[{&(0x7f0000003c00)=""/222, 0xde}, {&(0x7f0000003d00)=""/4096, 0x1000}, {&(0x7f0000004d00)=""/67, 0x43}], 0x3, &(0x7f0000004dc0)=""/193, 0xc1}, 0x1}, {{&(0x7f0000004ec0)=@l2tp6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000004fc0)=[{&(0x7f0000004f40)=""/40, 0x28}, {&(0x7f0000004f80)=""/37, 0x25}], 0x2, &(0x7f0000005000)=""/227, 0xe3}, 0x5}, {{&(0x7f0000005100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80, &(0x7f00000075c0)=[{&(0x7f0000005180)=""/4096, 0x1000}, {&(0x7f0000006180)=""/57, 0x39}, {&(0x7f00000061c0)}, {&(0x7f0000006200)=""/7, 0x7}, {&(0x7f0000006240)=""/165, 0xa5}, {&(0x7f0000006300)=""/216, 0xd8}, {&(0x7f0000006400)=""/4096, 0x1000}, {&(0x7f0000007400)=""/239, 0xef}, {&(0x7f0000007500)=""/123, 0x7b}, {&(0x7f0000007580)=""/42, 0x2a}], 0xa, &(0x7f0000007680)=""/4096, 0x1000}, 0x7}, {{0x0, 0x0, &(0x7f0000009bc0)=[{&(0x7f0000008680)=""/96, 0x60}, {&(0x7f0000008700)=""/247, 0xf7}, {&(0x7f0000008800)=""/4096, 0x1000}, {&(0x7f0000009800)=""/144, 0x90}, {&(0x7f00000098c0)=""/107, 0x6b}, {&(0x7f0000009940)=""/85, 0x55}, {&(0x7f00000099c0)=""/53, 0x35}, {&(0x7f0000009a00)=""/229, 0xe5}, {&(0x7f0000009b00)=""/145, 0x91}], 0x9, &(0x7f0000009c80)=""/18, 0x12}, 0x7f}, {{0x0, 0x0, &(0x7f0000009f40)=[{&(0x7f0000009cc0)=""/68, 0x44}, {&(0x7f0000009d40)=""/148, 0x94}, {&(0x7f0000009e00)=""/90, 0x5a}, {&(0x7f0000009e80)=""/158, 0x9e}], 0x4}, 0x3}, {{0x0, 0x0, &(0x7f000000a380)=[{&(0x7f0000009f80)=""/151, 0x97}, {&(0x7f000000a040)=""/150, 0x96}, {&(0x7f000000a100)=""/211, 0xd3}, {&(0x7f000000a200)=""/213, 0xd5}, {&(0x7f000000a300)=""/65, 0x41}], 0x5, &(0x7f000000a400)=""/88, 0x58}, 0x9}, {{&(0x7f000000a480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000a740)=[{&(0x7f000000a500)}, {&(0x7f000000a540)=""/160, 0xa0}, {&(0x7f000000a600)=""/68, 0x44}, {&(0x7f000000a680)=""/126, 0x7e}, {&(0x7f000000a700)=""/32, 0x20}], 0x5, &(0x7f000000a7c0)=""/242, 0xf2}, 0x200}], 0xa, 0x40000020, &(0x7f000000ab40)={0x77359400}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xa, 0x0) 03:35:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xdf33) 03:35:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc5c}]}, 0x28}}, 0x0) 03:35:06 executing program 5: syz_io_uring_setup(0x184, &(0x7f00000002c0)={0x0, 0x65da}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000040), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xb, 0x0) 03:35:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x1000000) 03:35:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc60}]}, 0x28}}, 0x0) 03:35:06 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x2) recvmmsg(r0, &(0x7f0000000800)=[{{&(0x7f0000000040)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/8, 0x8}], 0x1, &(0x7f00000001c0)=""/175, 0xaf}, 0x10001}, {{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000340)=""/235, 0xeb}, {&(0x7f0000000440)=""/196, 0xc4}], 0x3, &(0x7f0000000540)=""/221, 0xdd}, 0x80}, {{&(0x7f0000000640)=@sco={0x1f, @none}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/99, 0x63}, {&(0x7f0000000740)=""/88, 0x58}], 0x2, &(0x7f0000003000)=""/4096, 0x1000}, 0x7ff2}], 0x3, 0x40, &(0x7f00000008c0)={0x0, 0x3938700}) r1 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') fadvise64(r1, 0x81, 0x5, 0x2) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r3, 0x6, 0x9, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000018c0)={0x0, 0x0}) recvmmsg(r3, &(0x7f00000017c0)=[{{&(0x7f0000000900)=@tipc=@id, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000980)=""/227, 0xe3}, {&(0x7f0000000a80)=""/38, 0x26}, {&(0x7f0000000ac0)=""/85, 0x55}, {&(0x7f0000000b40)=""/186, 0xba}], 0x4, &(0x7f0000000c40)=""/32, 0x20}, 0x1}, {{&(0x7f0000000c80)=@ieee802154, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000d00)=""/254, 0xfe}, {&(0x7f0000000e00)=""/232, 0xe8}, {&(0x7f0000000f00)=""/39, 0x27}, {&(0x7f0000000f40)=""/60, 0x3c}], 0x4, &(0x7f0000000fc0)=""/134, 0x86}, 0x5}, {{&(0x7f0000001080)=@generic, 0x80, &(0x7f00000013c0)=[{&(0x7f0000001100)=""/250, 0xfa}, {&(0x7f0000001200)=""/200, 0xc8}, {&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f0000001300)=""/153, 0x99}], 0x4}, 0x5}, {{&(0x7f0000001400)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001480)=""/237, 0xed}, {&(0x7f0000001600)=""/106, 0x6a}, {&(0x7f0000001580)=""/47, 0x2f}, {&(0x7f0000001680)=""/122, 0x7a}], 0x4, &(0x7f0000001740)=""/66, 0x42}, 0xfffffff7}], 0x4, 0x40000062, &(0x7f0000001900)={r4, r5+10000000}) 03:35:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xc, 0x0) 03:35:07 executing program 4: sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x0, 0x814, 0x70bd25, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0x1ff, 0x35}}}}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x4040001) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="5173782e4023bd25cb3c71691a74090001000000"], &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) mount(&(0x7f0000000080)=@md0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='qnx4\x00', 0x9000, &(0x7f0000000240)='\x00') sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2567.326867][T18465] __nla_validate_parse: 96 callbacks suppressed [ 2567.326886][T18465] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2567.345522][T18466] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2567.357162][T18468] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:35:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc64}]}, 0x28}}, 0x0) 03:35:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x20000000) 03:35:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x2000000) 03:35:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xd, 0x0) 03:35:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000080)='bond_slave_0\x00') sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:07 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x141000, 0x0) open_tree(r0, &(0x7f0000000080)='./file0\x00', 0x0) syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x2992b07b3bbf781f}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) accept4$bt_l2cap(r0, 0x0, &(0x7f00000000c0), 0x1800) 03:35:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xe, 0x0) 03:35:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc68}]}, 0x28}}, 0x0) 03:35:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000080)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x2c, r0}, './file0\x00'}) syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, r2}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200), 0x1001004, &(0x7f0000000240)={'trans=unix,', {[{@cache_mmap}, {@afid={'afid', 0x3d, 0x1}}, {@posixacl}, {@cache_loose}, {@loose}, {@cachetag={'cachetag', 0x3d, '@#\xbd%#<-\x00'}}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x3) 03:35:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x3000000) [ 2568.038301][T18486] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2568.058877][T18484] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2568.078102][T18484] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getneigh={0x14, 0x1e, 0x4, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000840}, 0x20040000) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000200)=""/94, &(0x7f0000000100)=0x5e) 03:35:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x10, 0x0) 03:35:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc6c}]}, 0x28}}, 0x0) 03:35:07 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) lseek(r1, 0x7, 0x3) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000340)=@nat={'nat\x00', 0x1b, 0x5, 0x3b0, 0x178, 0x250, 0xffffffff, 0x250, 0x250, 0x318, 0x318, 0xffffffff, 0x318, 0x318, 0x5, &(0x7f0000000040), {[{{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x5, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @port=0x4e21, @port=0x4e24}}}}, {{@uncond, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@icmp={{0x28}, {0x12, "951d", 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x16, @remote, @private=0xa010102, @icmp_id=0x68, @port=0x4e21}}}}, {{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@addrtype={{0x30}, {0x80, 0x200, 0x0, 0x1}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x2, @loopback, @empty, @icmp_id=0x65, @gre_key=0x93a}}}}, {{@ip={@remote, @multicast1, 0xffffff00, 0xffffffff, 'veth0_virt_wifi\x00', 'veth0_to_bond\x00', {}, {0xff}, 0x21, 0x2, 0x72}, 0x0, 0x98, 0xc8, 0x0, {}, [@common=@icmp={{0x28}, {0x4, "569e"}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x5, 0x7, 0x7, 0x2}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) 03:35:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffd, 0x0, @perf_bp={&(0x7f0000000440)}, 0x1410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000340)='./file1\x00') lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) pipe2(&(0x7f0000000480)={0xffffffffffffffff}, 0x80000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) lgetxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@random={'security.', ')!./}\x00'}, &(0x7f0000000200)=""/147, 0x93) [ 2568.167922][T18499] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:35:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x4000000) 03:35:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2b804, 0xc98a}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x20000000) 03:35:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x11, 0x0) [ 2568.232043][T18508] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2568.256600][T18513] IPVS: length: 94 != 8 03:35:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc70}]}, 0x28}}, 0x0) 03:35:08 executing program 5: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000000080)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r2, 0x5000943f, &(0x7f0000000600)={{r3}, 0x0, 0x28, @unused=[0xe5, 0x10001, 0x9398, 0x2], @subvolid=0xfff}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r4, 0x5437, &(0x7f0000000100)) r5 = gettid() kcmp(r5, r5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000340)={{r1}, 0x0, 0xe, @inherit={0x80, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"]}, @subvolid=0x100}) syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_submit(r6, r8, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xb, 0x1}, 0x1000) r9 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r9, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2568.319489][T18519] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:35:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x70bd2c, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x1) 03:35:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0xc000}, 0x0) 03:35:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x5000000) 03:35:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x12, 0x0) 03:35:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc74}]}, 0x28}}, 0x0) [ 2568.404837][T18531] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:08 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ef9000/0x4000)=nil, 0x4000, 0x1000000, 0x11, r0, 0x8000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000001340)={{0x1, 0x1, 0x18, r2, {0x3ff}}, './file0\x00'}) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000280)=@getaddr={0x14, 0x16, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [""]}, 0x14}}, 0x2044) r6 = memfd_secret(0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x17, 0x9, &(0x7f0000000040)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x1}, @alu={0x7, 0x1, 0xb, 0x8, 0xb, 0x6, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @jmp={0x5, 0x0, 0x8, 0x5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff}, @generic={0xa9, 0x9, 0x8, 0x8001, 0x10000}, @generic={0xdd, 0x5, 0x2, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x5}], &(0x7f00000000c0)='GPL\x00', 0x5, 0x1000, &(0x7f0000000340)=""/4096, 0x40f00, 0x14, '\x00', r4, 0x1e, r0, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0xc, 0x400, 0x3ff}, 0x10, 0xffffffffffffffff, r6}, 0x78) 03:35:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROMISCUITY={0x8, 0x1e, 0x40}]}, 0x28}}, 0x0) 03:35:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x21, 0x0) 03:35:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x5c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@GTPA_LINK={0x8, 0x1, r2}, @GTPA_FLOW={0x6}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_NET_NS_FD={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_TID={0xc, 0x3, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x6000000) 03:35:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc78}]}, 0x28}}, 0x0) 03:35:08 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x452000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c40)={r2}) r5 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) sendto$packet(r4, &(0x7f0000000c80)="4a1125d9c059164d1c2c8a728903aab3a4f712481ab2ea6fbd91f2abd768d6b4420186f580f1ef5d51dd76e960378b9f3f10255ee51da41e8be04bd9907665fbe5fd365cc93a37bfe204cadc88d43820005ef62152f816bde67a999af6669b68ab233b9582", 0x65, 0x4000, &(0x7f0000000d00)={0x11, 0x4, r6, 0x1, 0x2, 0x6, @broadcast}, 0x14) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r8, 0x0) setsockopt$RXRPC_SECURITY_KEY(r8, 0x110, 0x1, &(0x7f0000000240)='vlan\x00', 0x5) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40448}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@deltclass={0x3c, 0x29, 0x1, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0x10}, {0x5, 0x7}, {0xffe0, 0x1}}, [@TCA_RATE={0x6, 0x5, {0x3f, 0x89}}, @tclass_kind_options=@c_cbs={0x8}, @TCA_RATE={0x6, 0x5, {0x0, 0xff}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40844}, 0x8001) 03:35:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x25, 0x0) 03:35:08 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) syz_io_uring_setup(0x186, &(0x7f0000000040)={0x0, 0xffffffff, 0x10, 0x0, 0x3dc, 0x0, r0}, &(0x7f0000eef000/0x1000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') fadvise64(r1, 0x9, 0x3, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc7c}]}, 0x28}}, 0x0) 03:35:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') chmod(&(0x7f0000000040)='./file0\x00', 0xa) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x7000000) 03:35:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2801001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x6, 0xfbb8}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20004000) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='vfat\x00') perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x6, 0x0, 0x9, 0x0, 0x0, 0x3f, 0x40801, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6200d61b, 0x0, 0x0, 0x0, 0x8, 0x1, 0x2, 0x2e, 0xbfa, 0x0, 0x0, @perf_bp, 0xc00}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x9) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, 0x0) listxattr(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18020000000000000000000000000020850000002c00000095000000000000008f6072b9cd66f12bafbdd1cfd54b2cfea1ee537da31caf6b4f5417e6663213a7e0ae9b0b4e9522ba88bf88c4fa8c06fcf93aafe4de8b47f471c37f5a3706ad872845363420311beca9092e278e9cfe41b2a14cee5f06b6caa4317d15d6be56126c15f7f848c0f6d3ccaabb88bcacef79b244d5f30fdde058b71dfcf2abb7e54f4270b1da"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001400)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x18) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="3400000010000100"/20, @ANYRES32=0x0, @ANYBLOB="00000200140004000c002b80080001000ac210bb7b955843f0165348f0ac8f353bfca666a875aaa1a1f004fa355f3264c8ae3e366756fea0786cfc869be9aa32e2e397f48133f43362926cb0f0ce", @ANYRES32=r2, @ANYBLOB="08001b0000000000"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00001b00"/16], 0x28}}, 0x0) 03:35:08 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000eed000/0x1000)=nil, 0x1000, 0x2000003, 0x12, r0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x80102, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000200)=@IORING_OP_STATX={0x15, 0x2, 0x0, r2, &(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0xa0b8568957b13d8c, 0x100, 0x1}, 0xde8) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x48, 0x0) 03:35:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc80}]}, 0x28}}, 0x0) 03:35:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="10238ba1631f900a"], 0x30}}, 0x0) 03:35:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x8000000) 03:35:08 executing program 3: mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2\x00', 0x1ff) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @broadcast}, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) 03:35:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x4c, 0x0) 03:35:08 executing program 5: r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e, 0x80000) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6erspan0\x00', 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x408802, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f00000001c0)) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x2, 'syzkaller1\x00', {0x2}, 0x1}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x30, r3, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000eed000/0x4000)=nil, 0x4000, 0x3000001, 0x10, r3, 0x10000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={r1, 0x0, 0x33, 0xd1, &(0x7f0000000200)="561799237b8bba8f7e3163cbf93a047a4365922490aa5983c6f2456362b9f828ad0b7afeb6ac384e251bf5198f05bab9cd63f5", &(0x7f0000000240)=""/209, 0x9, 0x0, 0x95, 0x6b, &(0x7f0000000340)="95de46472f4e7230f2bef83b18913733ddbe25d68bb6267861966b7f1d6416531fff22d6bc5ebfb587a87cf10640195bdde6ac75b7fee70d220db0ca6883c3d4cdb4ea237bb83a183b999b713adc10de7b5a2fe0dc611193a99aa376b5e36267fdd6a37ca244d603ca0a9af8bd11f09e646910ed88ff0672e2d7d4548dc7b9cf33c0e5f019d4a129e10aaad918ffd0a5e1baa40242", &(0x7f0000000400)="e136685595943087696a5ab5b619bd77e3f13cccf77fdacc7c461ba74465b3bc27744f295de380b6ce7e5e6581c6f8d7057d30fe6d059fb4bf0be7e6d5bc38d9dc0d35fd74c6c508da5a9fd8aa93bfe43e19d51b8328f71d5dd290f3acc22273798094eec41eecae6e2977", 0x1, 0x2}, 0x48) 03:35:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc84}]}, 0x28}}, 0x0) 03:35:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xe) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="000011000080000000000000"], &(0x7f00000004c0)=""/58, 0x3a) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r2, 0x0) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x82) 03:35:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x9000000) 03:35:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000001c9400000800000000000000"], 0x28}}, 0x0) 03:35:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x68, 0x0) 03:35:08 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000000080)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000040)={{0x0, 0x100, 0x9, 0x2, 0x91c, 0x81, 0x4, 0x9, 0xefd7, 0x7ff, 0x2, 0x9, 0x20, 0x7, 0x6}, 0x10, [0x0, 0x0]}) 03:35:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc88}]}, 0x28}}, 0x0) 03:35:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x6c, 0x0) 03:35:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xa000000) 03:35:08 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket(0x10, 0x80002, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1ad5a4d0ad8fe763972a0bade0fc8f6c1ae4c395ac824070e94eb9288f882d47adc16d5fc31b606072a47a4e1f9a54035eafb978a81b51d783d46c1808458c6aa46fd4be1253bbe85ca8c90af918d73ce3e793f671b5c1f1d123f018aa29e390a2856b761889f7bbdcc54c5a7d5881324be5b1654b20ef3ac784c3a5f37ca8f6f46d2bbbb9cb26547ed6f2922435c2c1ee5a1bba354ca2eed1b88d393d0dc8eba16bc60acf64a9a8b55ca1ed176d5ec62c7265187cf1d630fa7ac214ffd86c593b3bb07d1814052830999f9711c70a86", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c70cf4332c14f6e2c2abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f90327d6216e9760fcd648fa65655768fc440a61be189e36e2f665b20a01dd1e2c3be9c9a6964741360a8197159a93627c134fabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4cda923", @ANYRES32=r2, @ANYRES16=r1, @ANYRESOCT=r2, @ANYRES32=r4, @ANYRES64=r5, @ANYBLOB="493c9d23e4857d971ef801d0bdcd796b3fcaac9cc831ae8bcbcc6d4113d00413bc2ab67e298e6053a9cbe2ab654a12449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ec0b74ba8792b4060b8949"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r7 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r8, r9, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r10}}, 0x10001) syz_io_uring_submit(r5, 0x0, &(0x7f0000000080)=@IORING_OP_LINK_TIMEOUT={0xf, 0x1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x77359400}, 0x1, 0x0, 0x1, {0x0, r10}}, 0x9) 03:35:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc90}]}, 0x28}}, 0x0) 03:35:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x74, 0x0) 03:35:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc94}]}, 0x28}}, 0x0) 03:35:09 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xffffffff}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) io_uring_enter(r0, 0x3bb9, 0x9fb4, 0x1, &(0x7f0000000040)={[0x544]}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xc000000) [ 2570.815633][ T8738] device hsr_slave_0 left promiscuous mode [ 2570.823161][ T8738] device hsr_slave_1 left promiscuous mode [ 2570.862791][ T8738] bond3 (unregistering): Released all slaves [ 2570.872518][ T8738] bond2 (unregistering): Released all slaves [ 2570.880843][ T8738] bond1 (unregistering): Released all slaves [ 2570.942610][ T8738] bond0 (unregistering): Released all slaves [ 2571.304614][T18824] chnl_net:caif_netlink_parms(): no params data found [ 2571.342484][T18824] bridge0: port 1(bridge_slave_0) entered blocking state [ 2571.349568][T18824] bridge0: port 1(bridge_slave_0) entered disabled state [ 2571.357603][T18824] device bridge_slave_0 entered promiscuous mode [ 2571.364965][T18824] bridge0: port 2(bridge_slave_1) entered blocking state [ 2571.372122][T18824] bridge0: port 2(bridge_slave_1) entered disabled state [ 2571.380025][T18824] device bridge_slave_1 entered promiscuous mode [ 2571.397312][T18824] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2571.408986][T18824] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2571.430720][T18824] team0: Port device team_slave_0 added [ 2571.437097][T18824] team0: Port device team_slave_1 added [ 2571.455483][T18824] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2571.462463][T18824] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2571.488498][T18824] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2571.501877][T18824] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2571.508975][T18824] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2571.534858][T18824] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2571.558768][T18824] device hsr_slave_0 entered promiscuous mode [ 2571.565436][T18824] device hsr_slave_1 entered promiscuous mode [ 2571.571796][T18824] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2571.579336][T18824] Cannot create hsr debugfs directory [ 2571.620885][T18824] bridge0: port 2(bridge_slave_1) entered blocking state [ 2571.628050][T18824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2571.635434][T18824] bridge0: port 1(bridge_slave_0) entered blocking state [ 2571.642645][T18824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2571.672807][T18824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2571.682919][T19047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2571.690911][T19047] bridge0: port 1(bridge_slave_0) entered disabled state [ 2571.699997][T19047] bridge0: port 2(bridge_slave_1) entered disabled state [ 2571.708669][T19047] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2571.722703][T18824] 8021q: adding VLAN 0 to HW filter on device team0 [ 2571.731993][ T2192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2571.740355][ T2192] bridge0: port 1(bridge_slave_0) entered blocking state [ 2571.747386][ T2192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2571.756807][T31921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2571.765655][T31921] bridge0: port 2(bridge_slave_1) entered blocking state [ 2571.772685][T31921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2571.788081][T18824] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2571.798595][T18824] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2571.811964][T31921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2571.820553][T31921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2571.829112][T31921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2571.837645][T31921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2571.847494][T31921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2571.855019][T31921] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2571.865214][ T2192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2571.873298][ T2192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2571.882872][T18824] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2571.928401][ T2192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2571.968253][T18824] device veth0_vlan entered promiscuous mode [ 2571.975712][T31918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2571.984149][T31918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2571.991906][T31918] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2572.000980][T18824] device veth1_vlan entered promiscuous mode [ 2572.012195][ T2192] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2572.020261][ T2192] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2572.029158][ T2192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2572.038471][T18824] device veth0_macvtap entered promiscuous mode [ 2572.046693][T18824] device veth1_macvtap entered promiscuous mode [ 2572.057904][T18824] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2572.066228][T31918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2572.075533][T31918] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2572.086923][T18824] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2572.094556][ T2192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:35:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'vlan1\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@dellink={0x50, 0x11, 0x200, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, 0x40000, 0x50850}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @lowpan={{0xb}, {0x4}}}, @IFLA_MTU={0x8, 0x4, 0xfffffffa}, @IFLA_XDP={0x14, 0x2b, 0x0, 0x1, [@IFLA_XDP_FLAGS={0x8, 0x3, 0x3}, @IFLA_XDP_FD={0x8, 0x1, r5}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x60000}, 0x801) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x7a, 0x0) 03:35:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xc9c}]}, 0x28}}, 0x0) 03:35:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xf000000) 03:35:11 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = gettid() perf_event_open(&(0x7f0000000080)={0x5b437f70b7c6f45d, 0x80, 0x7, 0x20, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x4, @perf_bp={&(0x7f0000000040), 0xa}, 0x8000, 0xfffffffffffeffff, 0x0, 0x1, 0x1000, 0x9, 0x2, 0x0, 0x5, 0x0, 0x66cc}, r0, 0xa, 0xffffffffffffffff, 0x2) r1 = syz_open_procfs(r0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) mknodat$null(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x100, 0x103) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="1b3d3954fbeaa559d8b61e72afbd01bcade6283fd1e6e5feb5de59e65eeea9ef9e8020139d4de826629e95bad9c19bd91c98f157b11b76e5c63dd616eb6f2c746e9e7d0a84a72f8c4862d487bd5efb0daff419437ebd7276b4354962dda74603f8ffffff96ff823a62d0859b2a2313b869cf14f901a4aa5d37ebc0b45d72f0e788cb4c6194c333f06045abb679e9a96001e8a3c5214144b4649468e241635f7ca2888036e101f679616abece24"], &(0x7f00000004c0)=""/58, 0x3a) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000050e80)={0x0, 0x0, "60ae7bb1bb69bb3abebc2758aaa5666f05df6315f741cd0ccbdd4e85cb689d05f0d7542a21069d80f28897074ff8256e6c524fcd6c740d9688554ef67a749538e7a2cf84e9822abcc5cd2c10557e29d5a9c9664f0c8bef957786533227de8249d7959c4f4c0a1a773090aabe069bf8a8cedc64cb3d688f944830639de1f129bf293ae07fa3a49458e7084956f11625bc3caa6f2d9dec4c2a415d5d41ee6e12859bed85e288cf9d07d181e756f9b972dd17300bc727a190936dccbfb02ba6c604fce60fb170bb6fb3aa9361da53638fef75764c472b505b59f4376bdfcc18de8daf9b6674e56e5a4ff1fa3fa39f48e25d979784498b6eb59200f7bfa37c70096a", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000051e80)={0x200, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x7f, "e828cee719f5e5"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000052e80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000053080)={{0x0, 0x4, 0x6, 0x4, 0x1, 0x6, 0xe0, 0x73d, 0xaedf, 0x7da, 0x1000, 0x800, 0x8, 0x0, 0x5}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000054080)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000054280)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x80, "3e5f69634ae158"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055280)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {r5}, {r6, r7}, {}, {r8, r9}, {}, {}, {}, {0x0, r10}], 0x1f, "27b29eaf7092ba"}) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="30000000100001a00800"/21, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) 03:35:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x300, 0x0) 03:35:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xca0}]}, 0x28}}, 0x0) 03:35:11 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) preadv(0xffffffffffffffff, &(0x7f00000015c0), 0x0, 0x1004800, 0x0) 03:35:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x10000000) 03:35:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xdd4}]}, 0x28}}, 0x0) [ 2572.245604][T18883] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2572.256992][T18883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2572.264524][T18883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x500, 0x0) 03:35:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0010000008"], 0x28}}, 0x0) 03:35:12 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x3, 0x10, 0x4, 0xffffffffffffffc0}, &(0x7f0000000080)=0x18) [ 2572.297931][T18891] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2572.309750][T18891] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2572.318694][T18891] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x21000000) 03:35:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) mount(&(0x7f0000000080)=@nullb, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='ecryptfs\x00', 0x41008, &(0x7f0000000240)='@#\xbd%#<-\x00') chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x100) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[], 0x30}}, 0x0) [ 2572.354577][T18895] __nla_validate_parse: 33 callbacks suppressed [ 2572.354665][T18895] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2572.375233][T18896] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x600, 0x0) 03:35:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xddc}]}, 0x28}}, 0x0) 03:35:12 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000040), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c000000260000042dbd7000fcdbdf2500000000", @ANYRES32=r2, @ANYBLOB="f3ff010006000200e0ffebff04000a0004e9090004000a0004000a25677d93c3000a0004000a0004000a080000000000000000001fd0c76a4660fa7e5fc211aa43f705a21aee4cb8d10efa85f4f0202e6740636bf6678a62f78ecac121cdf4630f240482bb4d6e860f680c8818d16e248374389743baceeab38ea8814f611a752d58d5fda73d644bbabb84dff994c634a92ea5e8a9da90f08cad10dda5dbeafa841fdb909c36c02f9417894c237d905a97547da7236effdb33b642db74a2cddceb6d4dbe7f3029744eb0ecead2674887c4da4324bbbeef8aa9621afd281d2216d89c6867a82a8d9868810ce439f3ca8aca997eea8e09"], 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x2080) sendfile(r1, r0, &(0x7f0000000240)=0xb65, 0x6) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2572.453936][T18907] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2572.486028][T18913] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 03:35:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x60000000) 03:35:12 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x3ab801, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x8, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r2, 0x5ecca3463ebd3d36, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340), r1) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x44, r3, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000880) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x62, &(0x7f0000000100)={@local, @random, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x2c, 0x2b, 0x0, @remote, @local, {[@srh={0x6, 0x2, 0x2, 0x1, 0x0, 0x0, 0x0, [@private1]}], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2572.526328][T18916] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2572.539125][T18916] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x700, 0x0) 03:35:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe00}]}, 0x28}}, 0x0) 03:35:12 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x20000}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r1 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) preadv(r1, &(0x7f0000001380)=[{&(0x7f0000000080)=""/200, 0xc8}, {&(0x7f00000001c0)=""/202, 0xca}, {&(0x7f0000000340)=""/45, 0x2d}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x4, 0xffff, 0x9) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2572.614351][T18928] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2572.644252][T18930] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2572.654357][T18930] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2572.661863][T18930] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2572.687912][T18934] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2572.698733][T18934] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2572.708049][T18935] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2572.709736][T18934] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2572.717984][T18935] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:12 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, &(0x7f0000000000)={0x6, 0x3, 0x2}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400"/20], 0x14}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getroute={0x14, 0x1a, 0x10, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x48010) 03:35:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1012}], 0xbb, 0x0, 0x0) 03:35:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x65580000) 03:35:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe04}]}, 0x28}}, 0x0) 03:35:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x900, 0x0) 03:35:12 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') syz_io_uring_setup(0x3929, &(0x7f0000000080)={0x0, 0x28f4, 0x1, 0x2, 0x294, 0x0, r0}, &(0x7f0000ef0000/0x3000)=nil, &(0x7f0000ef5000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000180)=@IORING_OP_WRITE_FIXED={0x5, 0x3, 0x4004, @fd_index=0x1, 0x20, 0x5, 0x6, 0x10, 0x0, {0x2, r3}}, 0x140000) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) clone3(&(0x7f0000000440)={0x100000000, &(0x7f00000001c0)=0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240), {0xe}, &(0x7f0000000340)=""/124, 0x7c, &(0x7f00000003c0)=""/102, &(0x7f0000000280)=[0x0, 0x0], 0x2, {r1}}, 0x58) fstatfs(r5, &(0x7f00000004c0)=""/169) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, r4) [ 2572.749236][T18937] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@delneigh={0x1c, 0x1d, 0x300, 0x70bd2b, 0x25dfdbff, {0x2, 0x0, 0x0, 0x0, 0x10, 0x3d, 0x8}}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=@newqdisc={0xa0, 0x24, 0x400, 0x70bd25, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0xa, 0xfff2}, {0x6, 0x8}, {0xb, 0x6}}, [@TCA_STAB={0x6c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x5, 0x3, 0x5, 0x1, 0x7, 0x3}}, {0x4}}, {{0x1c, 0x1, {0x9, 0x40, 0x8, 0x1, 0x0, 0x401, 0xfffffe6e}}, {0x4}}, {{0x1c, 0x1, {0x5, 0x5, 0x31, 0xfffffffe, 0x0, 0x1, 0xfffff800, 0x3}}, {0xa, 0x2, [0x4, 0x6, 0x101]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x5}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x58004) 03:35:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe08}]}, 0x28}}, 0x0) 03:35:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xa00, 0x0) 03:35:12 executing program 4: perf_event_open(&(0x7f0000001900)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) fcntl$setlease(r0, 0x400, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) clone3(&(0x7f0000000440)={0x19004000, &(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000200), {0x35}, &(0x7f0000000500)=""/4096, 0x1000, &(0x7f0000000240)=""/130, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0xfffd}, 0x0, 0x0, 0x0, 0x5}, r1, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r2 = socket$nl_route(0x10, 0x3, 0x0) lgetxattr(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000001600)=""/57, 0x39) openat2$dir(0xffffffffffffff9c, &(0x7f0000001500)='./file0\x00', &(0x7f0000001540)={0x82080, 0x20, 0x5}, 0x18) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x81000000) [ 2572.865781][T18954] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18954 comm=syz-executor.3 [ 2572.879491][T18954] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18954 comm=syz-executor.3 03:35:12 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ef3000/0x4000)=nil, 0x4000, 0x8, 0x2010, r0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000440)=@IORING_OP_WRITEV={0x2, 0x3, 0x6000, @fd=r1, 0x9, &(0x7f00000003c0)=[{&(0x7f0000000040)="2d079658b53efdb179edfeb442efa2357c5bf5c75cef1437770cd3dec9365972e477b996d6fc7c5df50dac0978a26459106241373116e914b4cbba4298f91b91c81e13a3f95cde4abb08dff48026564edaa4311d3c8cf016ea873141f55d78836f663f03a3dcb88c2a534ba55aee0ae96de079b39d52aca7d35228b27fc875975134eaefa21284fcff98d99f98e9b06ab95de774eb70d09a1ea7c8aa75a4d06576cea4908e4314c58d5696905935431e6eea5cda91534f5b81191c9ad23401", 0xbf}, {&(0x7f0000000100)="9a44f62d673f4f33db3a2988a54801a6d3f52292cd69ec31c690221bd3379836d8c75dc250ba704a61af0b0cfe9999dfab80b77de6c0b66280ec7aad5a5a4c5c9d52e1e0", 0x44}, {&(0x7f00000001c0)="82b2200aa17c1b7f5b8965ad6249af0f65742e9eb44d079772a852a932036c769d9bd90bbce1b4db7001e6d3207a412bc4fdc3449aa542f661c7d9", 0x3b}, {&(0x7f0000000200)="bbac47e53a82217572e51e47897c4355808d24c682e3334676d6921cbf003ff4feadd9fa0ec70caf5769da42aafcee5babcb389044a7d78a2f7a6d7f4e5f95fb8701f6762b01f297c7dd2b61a5b9ac33a9a2a46d4b316929ce7d95b5d69c6d5a463c83c0fb0f15c4c236b860f88a66a6f9150622a6904137763119400641ee3c51b9c6a5005a911e5c22cc", 0x8b}, {&(0x7f0000000340)="901708d214a5d645cee86d4e1e253c1db2c80ba55770cad5db3aa0a78099e0248b8f7237bc1fc7e93b5d3ac476c1dc8bcb6d1eb824e8a3f15b12e65f258814368b5cf29f41dc638ed9d2", 0x4a}], 0x5, 0x4, 0x1, {0x3}}, 0xfff) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe0c}]}, 0x28}}, 0x0) 03:35:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xb00, 0x0) [ 2573.028769][T18973] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2573.038813][T18973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2573.046365][T18973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 03:35:12 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x20010, r0, 0x8000000) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x81ffffff) [ 2573.071181][T18973] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2573.081154][T18973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2573.090067][T18973] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe10}]}, 0x28}}, 0x0) 03:35:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xc00, 0x0) 03:35:12 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x32bd, 0x10, 0x1, 0x28e}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000)=0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={r3}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={r3, 0x6, 0x3ff}, 0x8) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) r4 = socket(0x10, 0x80002, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000200)) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r8, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r8, r9, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1ad5a4d0ad8fe763972a0bade0fc8f6c1ae4c395ac824070e94eb9288f882d47adc16d5fc31b606072a47a4e1f9a54035eafb978a81b51d783d46c1808458c6aa46fd4be1253bbe85ca8c90af918d73ce3e793f671b5c1f1d123f018aa29e390a2856b761889f7bbdcc54c5a7d5881324be5b1654b20ef3ac784c3a5f37ca8f6f46d2bbbb9cb26547ed6f2922435c2c1ee5a1bba354ca2eed1b88d393d0dc8eba16bc60acf64a9a8b55ca1ed176d5ec62c7265187cf1d630fa7ac214ffd86c593b3bb07d1814052830999f9711c70a86", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c70cf4332c14f6e2ce62abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f90327d6216e9760fcd648fa65655768fc440a61be189e36e08005b20a01dd1e2c3be9c9a6964741360a8197159a93627c134fabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4cda923", @ANYRES32=r4, @ANYRES16=r2, @ANYRESOCT=r4, @ANYRES32=r7, @ANYRES64=r8, @ANYBLOB="493c9d23e4857d971ef801d0bdcd796b3fcaac9cc831ae8bcbcc6d4113d00413bc2ab67e298e6053a9cbe2ab654a12449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ec0b74ba8792b4060b8949"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) syz_io_uring_submit(r0, r7, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index=0x4, 0x400, 0x0, 0x5}, 0x800) 03:35:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2573.239390][T18993] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2573.251060][T18993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2573.258665][T18993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x88470000) 03:35:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe14}]}, 0x28}}, 0x0) 03:35:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket(0xf, 0xa, 0x3f) 03:35:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xd00, 0x0) [ 2573.292530][T18993] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2573.305641][T18993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2573.315666][T18993] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:13 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dvb_usb_rtl28xxu', 0x400000, 0x1) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xe, 0x110, r0, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) r6 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r9}}, 0x10001) syz_io_uring_submit(r2, r5, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x7, 0x0, 0x0, 0x0, {0x4220}, 0x0, {0x0, r9}}, 0x1) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000200)={0x5, &(0x7f00000001c0)=[{0x5, 0x1, 0x1, 0xde0000}, {0x8, 0x9, 0x3, 0x186ef90f}, {0x200, 0x81, 0x20, 0x40f1b7ba}, {0x8000, 0x9, 0x5, 0x81}, {0xb3, 0x9, 0x3f}]}) fcntl$getflags(r10, 0x1) 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x88480000) 03:35:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xe00, 0x0) [ 2573.461739][T19017] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2573.472976][T19017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2573.480845][T19017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe18}]}, 0x28}}, 0x0) 03:35:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@bridge_getvlan={0x40, 0x72, 0x300, 0x70bd27, 0x25dfdbff, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x2000c050}, 0x4040) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:13 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0xfffffffd}, &(0x7f0000ef2000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) [ 2573.516481][T19017] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2573.526332][T19017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2573.534950][T19017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x1100, 0x0) 03:35:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe1c}]}, 0x28}}, 0x0) 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x88a8ffff) 03:35:13 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index=0x6, 0x1, 0x0, 0x5, 0x0, 0x1}, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) [ 2573.687810][T19038] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2573.698921][T19038] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2573.708783][T19038] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x1200, 0x0) 03:35:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe20}]}, 0x28}}, 0x0) 03:35:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@bridge_newneigh={0x64, 0x1c, 0x20, 0x70bd26, 0x25dfdbfe, {0x2, 0x0, 0x0, 0x0, 0x11, 0x8, 0x1}, [@NDA_VLAN={0x6, 0x5, 0x3}, @NDA_PORT={0x6, 0x6, 0x4e22}, @NDA_MASTER={0x8, 0x9, 0xf9}, @NDA_DST_IPV4={0x8, 0x1, @multicast1}, @NDA_DST_IPV4={0x8, 0x1, @rand_addr=0x64010100}, @NDA_VLAN={0x6}, @NDA_SRC_VNI={0x8, 0xb, 0x6}, @NDA_VNI={0x8, 0x7, 0x1}, @NDA_VNI={0x8, 0x7, 0x3ff}]}, 0x64}, 0x1, 0x0, 0x0, 0x4840}, 0x24048815) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 2573.751137][T19045] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2573.764391][T19045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2573.772318][T19045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x9effffff) 03:35:13 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x40}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ef7000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) mmap$usbfs(&(0x7f0000ef4000/0x4000)=nil, 0x4000, 0x1, 0x4000010, 0xffffffffffffffff, 0x5) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_complete(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) 03:35:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x2000, 0x0) 03:35:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe24}]}, 0x28}}, 0x0) 03:35:13 executing program 4: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2573.931685][T19065] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2573.942310][T19065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2573.950450][T19065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xc3050000) 03:35:13 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xffffffff}, &(0x7f0000ef5000/0x1000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:13 executing program 3: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x2) 03:35:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x2500, 0x0) 03:35:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe30}]}, 0x28}}, 0x0) [ 2574.000209][T19072] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2574.016464][T19072] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2574.024632][T19072] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:13 executing program 4: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:13 executing program 5: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000700)=[{{&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000080)=""/159, 0x9f}, {&(0x7f00000001c0)=""/230, 0xe6}, {&(0x7f00000002c0)=""/218, 0xda}, {&(0x7f00000003c0)=""/103, 0x67}, {&(0x7f0000000440)=""/243, 0xf3}, {&(0x7f0000000540)=""/98, 0x62}, {&(0x7f00000005c0)=""/184, 0xb8}, {&(0x7f0000003000)=""/4096, 0x1000}], 0x8, &(0x7f0000000140)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}}], 0x1, 0x20, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000740)='net/ip_mr_vif\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xc3ffffff) 03:35:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="8e73782e40239c19025413a45181956fdc7ce61a28ed7c3fc3cf2dca0557f67243df2da78344469bfd682219b54c4b72faf867410966e81def1642822197c79bfea46e48cbdd81fd6039b24333c707ac7f2c67536fa6a62ea921e38f38615b4ea0fbac336e5eb7b42719b8e01242f8c1af5248f64bc830f13af93109e7b67682e6daa039af13bcac8b36f12f20a19078b6a0a03cbc43b604c82768636b2f74520fb849f61936254cdd4f897da1b3701ba3add15021bf7fd4bb4825e5d1aaa1ba1b4b1d42c000cba86f852f010000"], &(0x7f00000004c0)=""/58, 0x3a) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x4000, 0x0) 03:35:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe34}]}, 0x28}}, 0x0) 03:35:13 executing program 4: ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:13 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') readv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/84, 0x54}, {&(0x7f00000000c0)=""/28, 0x1c}], 0x2) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xdf330000) 03:35:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x4800, 0x0) 03:35:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe38}]}, 0x28}}, 0x0) [ 2574.307570][T19109] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2574.322370][T19109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2574.330629][T19109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2574.345508][T19109] device bridge_slave_0 left promiscuous mode [ 2574.351892][T19109] bridge0: port 1(bridge_slave_0) entered disabled state [ 2574.365965][T19109] device bridge_slave_1 left promiscuous mode [ 2574.372462][T19109] bridge0: port 2(bridge_slave_1) entered disabled state [ 2574.385160][T19109] bond0: (slave bond_slave_0): Releasing backup interface 03:35:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2574.415658][T19109] bond0: (slave bond_slave_1): Releasing backup interface 03:35:14 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/fscreate\x00') syz_io_uring_submit(r0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x5, 0x0, 0x0, 0x0, 0x468ac, 0x0, 0x0, 0x1}, 0x8000) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2574.456401][T19109] team0: Port device team_slave_0 removed [ 2574.494857][T19109] team0: Port device team_slave_1 removed 03:35:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x4c00, 0x0) 03:35:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xeaffffff) [ 2574.505691][T19109] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2574.513526][T19109] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2574.529442][T19109] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2574.537062][T19109] batman_adv: batadv0: Removing interface: batadv_slave_1 03:35:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xc00000000000000) 03:35:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe3c}]}, 0x28}}, 0x0) 03:35:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:14 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000140)="83", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x85, &(0x7f0000000040)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000100)=0x90) syz_io_uring_submit(r0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x4007, @fd_index=0x5, 0x100000, 0x100, 0x1f, 0x3, 0x1, {0x2}}, 0x5) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e21, @multicast2}}, 0x1000, 0x9, 0x4, 0x6d9d, 0xc, 0xfff, 0x40}, 0x9c) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x6800, 0x0) 03:35:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe40}]}, 0x28}}, 0x0) 03:35:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xefffffff) 03:35:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:14 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000000080)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000080)={{0x0, 0x53, 0x0, 0x3f, 0x3, 0x8, 0xc8, 0x1, 0x1ff, 0x10001, 0x5, 0x5, 0x2, 0x6, 0x6}, 0x20, [0x0, 0x0, 0x0, 0x0]}) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000040)=0x1, 0x4) 03:35:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x6c00, 0x0) [ 2574.730986][T19141] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2574.758455][T19141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2574.766695][T19141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0xbd2}], 0xbb, 0x0, 0x0) 03:35:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe44}]}, 0x28}}, 0x0) 03:35:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xf0ffffff) 03:35:14 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x2d0, &(0x7f0000000040)={0x0, 0x1d0d, 0x4, 0x3, 0xe6, 0x0, r0}, &(0x7f0000ef6000/0x2000)=nil, &(0x7f0000ef3000/0x6000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x7400, 0x0) 03:35:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x2100) 03:35:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe48}]}, 0x28}}, 0x0) 03:35:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x7a00, 0x0) 03:35:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xfeffffff) 03:35:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2575.111226][T19179] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2575.139812][T19179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2575.148420][T19179] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x200000, 0x0) 03:35:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe4c}]}, 0x28}}, 0x0) 03:35:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x6e) 03:35:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xffffa888) 03:35:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xe0ff7f, 0x0) 03:35:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe50}]}, 0x28}}, 0x0) 03:35:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xffffff7f) 03:35:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xf0ff1f, 0x0) [ 2575.517020][T19198] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x1000000, 0x0) 03:35:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xffffff81) 03:35:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x2000000, 0x0) [ 2575.572178][T19198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2575.592082][T19198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xffffff9e) 03:35:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x3000000, 0x0) 03:35:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 03:35:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe54}]}, 0x28}}, 0x0) 03:35:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x4000000, 0x0) 03:35:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xffffffc3) 03:35:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe58}]}, 0x28}}, 0x0) 03:35:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x5000000, 0x0) 03:35:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xffffffea) 03:35:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x6000000, 0x0) 03:35:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xffffffef) [ 2576.084296][T19239] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x7000000, 0x0) [ 2576.154943][T19239] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2576.184144][T19239] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x6000, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xfffffff0) 03:35:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x8000000, 0x0) 03:35:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe5c}]}, 0x28}}, 0x0) 03:35:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xfffffffe) 03:35:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe60}]}, 0x28}}, 0x0) 03:35:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x9000000, 0x0) 03:35:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:16 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000538c0)={0x0, 0x0, "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", "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"}) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f00000548c0)={{0x0, 0x81, 0x3ff, 0x1f, 0x6, 0x525, 0xfffffffffffffffa, 0x8, 0x3b3, 0x3, 0x1000, 0x1, 0xceb0, 0x2}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000558c0)={0x0, ""/256, 0x0, 0x0}) r10 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r10, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x1, "2156816c73038c"}) r14 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r14, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r14, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r16, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000055ac0)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r6}, {r8, r9}, {0x0, r13}, {0x0, r17}], 0x8, "ad184d7e3ed406"}) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000340)=""/4110, 0x100e}], 0x1, 0x4800, 0xcf6d) 03:35:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xa000000, 0x0) 03:35:16 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) io_uring_enter(r0, 0x2b37, 0x3545, 0x0, &(0x7f0000000040)={[0x4]}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, 0x0, 0x4008080) 03:35:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe64}]}, 0x28}}, 0x0) 03:35:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0xc305000000000000}, 0x0) 03:35:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x100000000000000) [ 2576.555020][T19279] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2576.563607][T19279] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2576.580595][T19279] net_ratelimit: 2 callbacks suppressed [ 2576.580603][T19279] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xb000000, 0x0) 03:35:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, 0x0, 0x4008080) 03:35:16 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0xc574, 0x4, 0x0, 0x14f}, &(0x7f0000eec000/0x2000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x100, &(0x7f0000001700), 0x0, 0x4) r2 = syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ef8000/0x4000)=nil, 0x4000, 0x4, 0x10010, r0, 0x10000000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r6, 0x6, 0x9, 0x0, &(0x7f0000000080)) syz_io_uring_submit(r3, r5, &(0x7f00000000c0)=@IORING_OP_FADVISE={0x18, 0x4, 0x0, @fd=r6, 0x0, 0x0, 0x5, 0x4, 0x1}, 0x2) r7 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') recvmmsg$unix(r7, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/41, 0x29}, {&(0x7f0000000340)=""/196, 0xc4}, {&(0x7f0000000440)=""/220, 0xdc}], 0x3, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000000540)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f00000005c0)=""/21, 0x15}, {&(0x7f0000000600)=""/47, 0x2f}], 0x2}}, {{&(0x7f0000000680)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/181, 0xb5}], 0x1}}, {{&(0x7f0000000800)=@abs, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000880)=""/12, 0xc}], 0x1, &(0x7f0000000900)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f0000000a00)=@abs, 0x6e, &(0x7f0000000f00)=[{&(0x7f0000000a80)=""/197, 0xc5}, {&(0x7f0000000b80)=""/117, 0x75}, {&(0x7f0000000c00)=""/177, 0xb1}, {&(0x7f0000000cc0)=""/57, 0x39}, {&(0x7f00000017c0)=""/66, 0x42}, {&(0x7f0000000d40)=""/149, 0x95}, {&(0x7f0000003000)=""/4096, 0x1000}, {&(0x7f0000000e00)=""/213, 0xd5}], 0x8, &(0x7f0000000f80)=ANY=[@ANYBLOB="1c400000000000000100000007000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}}, {{&(0x7f0000001040)=@abs, 0x6e, &(0x7f0000001240)=[{&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/190, 0xbe}, {&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000001180)=""/182, 0xb6}], 0x4}}, {{&(0x7f0000001280), 0x6e, &(0x7f0000001dc0)=[{&(0x7f0000001300)=""/216, 0xd8}, {&(0x7f0000001400)}, {&(0x7f0000001440)=""/220, 0xdc}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000001540)=""/85, 0x55}, {&(0x7f0000001600)=""/28, 0x1c}, {&(0x7f0000001640)=""/54, 0x36}, {&(0x7f0000001680)=""/94, 0x5e}, {&(0x7f0000001700)}, {&(0x7f0000001740)=""/111, 0x6f}, {&(0x7f0000001bc0)=""/243, 0xf3}, {&(0x7f0000001400)=""/54, 0x36}, {&(0x7f0000001cc0)=""/209, 0xd1}], 0xd, &(0x7f0000001880)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x7, 0x20, &(0x7f0000001a80)={0x0, 0x989680}) ioctl$BTRFS_IOC_SEND(r2, 0x40489426, &(0x7f0000001b40)={{r8}, 0xa, &(0x7f0000001ac0)=[0xcd9, 0x7fffffff, 0x1, 0x1000, 0x6, 0x6, 0x401, 0x8000, 0x1, 0x4], 0x6, 0x6, [0x7fff, 0xffffffff, 0x8, 0x1fb]}) preadv(r7, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r9 = openat$cgroup_freezer_state(r7, &(0x7f0000000040), 0x2, 0x0) fchdir(r9) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r10, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r10, 0x6, 0x9, 0x0, &(0x7f0000000080)) mmap(&(0x7f0000ef4000/0x2000)=nil, 0x2000, 0x0, 0x20010, r10, 0x65ea5000) 03:35:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe68}]}, 0x28}}, 0x0) 03:35:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x200000000000000) 03:35:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x8000000}, 0x0) 03:35:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xc000000, 0x0) 03:35:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, 0x0, 0x4008080) 03:35:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe6c}]}, 0x28}}, 0x0) 03:35:16 executing program 5: syz_io_uring_setup(0x18b, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r2 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380), &(0x7f0000000100)) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000140)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@x25={0x9, @remote}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/209, 0xd1}], 0x1, &(0x7f0000000340)=""/210, 0xd2}, 0x0, 0x0, 0x1, {0x3, r3}}, 0x9) 03:35:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x300000000000000) 03:35:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xd000000, 0x0) 03:35:16 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x1}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2576.924346][T19329] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2576.942485][T19329] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2576.951134][T19329] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe70}]}, 0x28}}, 0x0) 03:35:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x3000000}, 0x0) 03:35:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x400000000000000) 03:35:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xe000000, 0x0) 03:35:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe74}]}, 0x28}}, 0x0) 03:35:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:16 executing program 5: syz_io_uring_setup(0x188, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x400}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2577.180681][T19357] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2577.197439][T19357] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2577.205461][T19357] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x500000000000000) 03:35:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x4888, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x10000000, 0x0) 03:35:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe78}]}, 0x28}}, 0x0) 03:35:17 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) syz_io_uring_setup(0x188, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x11000000, 0x0) 03:35:17 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r0, r1, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1ad5a4d0ad8fe763972a0bade0fc8f6c1ae4c395ac824070e94eb9288f882d47adc16d5fc31b606072a47a4e1f9a54035eafb978a81b51d783d46c1808458c6aa46fd4be1253bbe85ca8c90af918d73ce3e793f671b5c1f1d123f018aa29e390a2856b761889f7bbdcc54c5a7d5881324be5b1654b20ef3ac784c3a5f37ca8f6f46d2bbbb9cb26547ed6f2922435c2c1ee5a1bba354ca2eed1b88d393d0dc8eba16bc60acf64a9a8b55ca1ed176d5ec62c7265187cf1d630fa7ac214ffd86c593b3bb07d1814052830999f9711c70a86", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c70cf4332c14f6e2c2abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f90327d6216e9760fcd648fa65655768fc440a61be189e36e2f665b20a01dd1e2c3be9c9a6964741360a8197159a93627c134fabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4cda923", @ANYRES32, @ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRES64=r0, @ANYBLOB="493c9d23e4857d971ef801d0bdcd796b3fcaac9cc831ae8bcbcc6d4113d00413bc2ab67e298e6053a9cbe2ab654a12449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ec0b74ba8792b4060b8949"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) r3 = socket(0x10, 0x80002, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r3, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1ad5a4d0ad8fe763972a0bade0fc8f6c1ae4c395ac824070e94eb9288f882d47adc16d5fc31b606072a47a4e1f9a54035eafb978a81b51d783d46c1808458c6aa46fd4be1253bbe85ca8c90af918d73ce3e793f671b5c1f1d123f018aa29e390a2856b761889f7bbdcc54c5a7d5881324be5b1654b20ef3ac784c3a5f37ca8f6f46d2bbbb9cb26547ed6f2922435c2c1ee5a1bba354ca2eed1b88d393d0dc8eba16bc60acf64a9a8b55ca1ed176d5ec62c7265187cf1d630fa7ac214ffd86c593b3bb07d1814052830999f9711c70a86", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c70cf4332c14f6e2c2abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f90327d6216e9760fcd648fa65655768fc440a61be189e36e2f665b20a01dd1e2c3be9c9a6964741360a8197159a93627c134fabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4cda923", @ANYRES32=r3, @ANYRES16=r2, @ANYRESOCT=r3, @ANYRES32=r5, @ANYRES64=r6, @ANYBLOB="493c9d23e4857d971ef801d0bdcd796b3fcaac9cc831ae8bcbcc6d4113d00413bc2ab67e298e6053a9cbe2ab654a12449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ec0b74ba8792b4060b8949"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) syz_io_uring_submit(r0, r5, &(0x7f00000001c0)=@IORING_OP_STATX={0x15, 0x4, 0x0, 0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x800, 0x4000}, 0x62) r8 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r8, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2577.427839][T19379] __nla_validate_parse: 86 callbacks suppressed [ 2577.427856][T19379] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2577.441332][T19380] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2577.456765][T19380] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe7c}]}, 0x28}}, 0x0) 03:35:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x600000000000000) 03:35:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0xf00}, 0x0) [ 2577.476324][T19381] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2577.477775][T19379] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x12000000, 0x0) 03:35:17 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/62, 0x3e}], 0x1, &(0x7f00000000c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x142) kcmp(r1, 0x0, 0x2, r0, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe80}]}, 0x28}}, 0x0) [ 2577.618122][T19396] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2577.648139][T19398] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2577.657381][T19399] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2577.661221][T19398] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2577.694786][T19399] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2577.710157][T19399] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 03:35:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x1ffff000, 0x0) [ 2577.719521][T19399] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:17 executing program 5: syz_io_uring_setup(0x188, &(0x7f0000000100)={0x0, 0x1789, 0x0, 0x5, 0x3d5}, &(0x7f0000eed000/0x4000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000080), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x700000000000000) 03:35:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe84}]}, 0x28}}, 0x0) 03:35:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0xc3050000}, 0x0) 03:35:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x20000000, 0x0) [ 2577.792738][T19409] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:35:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:17 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000ef7000/0x3000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8983, &(0x7f00000000c0)={0x7, 'netdevsim0\x00', {0xfffffffa}, 0xffff}) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r3 = fsmount(r1, 0x0, 0x8) mmap$IORING_OFF_SQES(&(0x7f0000ef8000/0x1000)=nil, 0x1000, 0x4, 0x50, r3, 0x10000000) splice(r3, &(0x7f0000000040)=0x9, r0, &(0x7f0000000080)=0x7, 0xfffffffffffffbff, 0x4) 03:35:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe88}]}, 0x28}}, 0x0) 03:35:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x800000000000000) 03:35:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x21000000, 0x0) 03:35:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8, 0x1b, 0xffffffea}]}, 0x30}}, 0x0) [ 2577.922122][T19422] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2577.947159][T19423] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe8c}]}, 0x28}}, 0x0) 03:35:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x25000000, 0x0) 03:35:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x900000000000000) 03:35:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8, 0x1b, 0xa00}]}, 0x30}}, 0x0) 03:35:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe90}]}, 0x28}}, 0x0) 03:35:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x40000000, 0x0) 03:35:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x600}, 0x0) 03:35:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xa00000000000000) 03:35:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe94}]}, 0x28}}, 0x0) 03:35:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x48000000, 0x0) 03:35:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xe98}]}, 0x28}}, 0x0) 03:35:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x4c000000, 0x0) [ 2578.431588][T19465] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2578.466066][T19465] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2578.475725][T19465] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:35:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x68000000, 0x0) 03:35:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0xea0}]}, 0x28}}, 0x0) 03:35:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xc00000000000000) 03:35:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 1) 03:35:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x6c000000, 0x0) 03:35:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x39}]}, 0x28}}, 0x0) 03:35:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xf00000000000000) 03:35:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x74000000, 0x0) [ 2578.749622][T19490] FAULT_INJECTION: forcing a failure. [ 2578.749622][T19490] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2578.763686][T19490] CPU: 0 PID: 19490 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2578.773873][T19490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2578.784223][T19490] Call Trace: [ 2578.787539][T19490] [ 2578.790467][T19490] dump_stack_lvl+0xd6/0x122 [ 2578.795120][T19490] dump_stack+0x11/0x1b [ 2578.799312][T19490] should_fail+0x23c/0x250 [ 2578.803753][T19490] should_fail_usercopy+0x16/0x20 [ 2578.808779][T19490] _copy_from_user+0x1c/0xd0 [ 2578.813373][T19490] sendmsg_copy_msghdr+0x60/0x2a0 [ 2578.818476][T19490] __sys_sendmsg+0x166/0x230 [ 2578.823078][T19490] __x64_sys_sendmsg+0x42/0x50 [ 2578.827929][T19490] do_syscall_64+0x44/0xd0 [ 2578.832348][T19490] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2578.839265][T19490] RIP: 0033:0x7f3f1b516ae9 [ 2578.843833][T19490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2578.863441][T19490] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2578.871858][T19490] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2578.879913][T19490] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2578.887954][T19490] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 03:35:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 2) [ 2578.895929][T19490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2578.904135][T19490] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2578.912252][T19490] 03:35:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x7a000000, 0x0) 03:35:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x1000000000000000) [ 2579.033698][T19502] FAULT_INJECTION: forcing a failure. [ 2579.033698][T19502] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2579.046790][T19502] CPU: 0 PID: 19502 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2579.057120][T19502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2579.067268][T19502] Call Trace: [ 2579.070551][T19502] [ 2579.073480][T19502] dump_stack_lvl+0xd6/0x122 [ 2579.078214][T19502] dump_stack+0x11/0x1b [ 2579.082372][T19502] should_fail+0x23c/0x250 [ 2579.086870][T19502] should_fail_usercopy+0x16/0x20 [ 2579.091893][T19502] _copy_from_user+0x1c/0xd0 [ 2579.096533][T19502] iovec_from_user+0xc4/0x2e0 [ 2579.101221][T19502] __import_iovec+0x57/0x2d0 [ 2579.105994][T19502] import_iovec+0xb8/0xd0 [ 2579.110390][T19502] sendmsg_copy_msghdr+0x275/0x2a0 [ 2579.115677][T19502] __sys_sendmsg+0x166/0x230 [ 2579.120399][T19502] __x64_sys_sendmsg+0x42/0x50 [ 2579.125175][T19502] do_syscall_64+0x44/0xd0 [ 2579.129593][T19502] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2579.135492][T19502] RIP: 0033:0x7f3f1b516ae9 [ 2579.139905][T19502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2579.154407][T19505] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2579.159606][T19502] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2579.159631][T19502] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2579.183158][T19502] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2579.191274][T19502] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2579.191304][T19502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2579.207321][T19502] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2579.207340][T19502] 03:35:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x7fffe000, 0x0) [ 2579.260908][T19505] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x2}]}, 0x28}}, 0x0) 03:35:19 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {0x0}], 0x1, "2156816c73038c"}) r9 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r9, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {r11, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5, r12}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x1, "2156816c73038c"}) r13 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r13, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r13, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000049e40)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x7f, "0b55b69f30d9b5"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f000004ae40)={0x0, 0x0, "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", "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"}) r19 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r19, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r19, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r21, r22}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r20}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r22}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r22}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r22}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004be40)={0x993, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {r11}, {0x0, r16}, {}, {}, {0x0, r17}, {0x0, r18}, {r20}], 0xff, "b10713bfab4a59"}) 03:35:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x2100000000000000) 03:35:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0xffffffff, 0x0) 03:35:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 3) 03:35:19 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ef0000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x8000000) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000080)=@IORING_OP_READV=@pass_iovec={0x1, 0xaaeb3388147db0a5, 0x4000, @fd_index=0xa, 0x1, &(0x7f0000000040), 0x0, 0x18, 0x1}, 0x7) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x3}]}, 0x28}}, 0x0) 03:35:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x6000000000000000) 03:35:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) 03:35:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x4}]}, 0x28}}, 0x0) 03:35:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x2) 03:35:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:19 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ef2000/0x3000)=nil, 0x3000, 0x8, 0x1010, r0, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x9, 0x10010, r0, 0x10000000) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000080)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x5, 0x0, 0xfffffeae, 0x3, &(0x7f0000000040)="adf72fe8017f38625d4fe94cc6", 0x1296d26e, 0x0, 0x1, {0x3, r4}}, 0x7f) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r6, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r5, 0xc0709411, &(0x7f0000000400)=ANY=[@ANYRES64=r7, @ANYBLOB="d413ffffffffffff07000000000000007f7000000000000000080000000000000300000000000000810000000000000020000000060000000008000002000000ffffffff000000007f00000000000000e0f6ffffffffffff5f000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e00b9db6245f7505a221313516979c10d572a90f75ab127c504e390f3ba27136c45be04de03438dee6feefee67a3c20dd69b462440e5b525933741b3b79706ce3c195b592e216b73c9715d0af1d6460dbc577b6d8e99f24a1493e867916b1c8e8a7bed5940fdf05bfbe27925903a2430d15c13ff297ad8dd32f605e1508cdce771eed4d8c1728f86085ca1817fb4bd6b9037f668c908f0743935ca4a5d57902e9a6298894b6d12a46584090d3c555d60060f34e3ffa3c2be7aa1f8"]) 03:35:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x6558000000000000) [ 2579.740510][T19544] FAULT_INJECTION: forcing a failure. [ 2579.740510][T19544] name failslab, interval 1, probability 0, space 0, times 0 [ 2579.753322][T19544] CPU: 1 PID: 19544 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2579.763623][T19544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2579.773868][T19544] Call Trace: [ 2579.777322][T19544] [ 2579.780239][T19544] dump_stack_lvl+0xd6/0x122 [ 2579.784818][T19544] dump_stack+0x11/0x1b [ 2579.789052][T19544] should_fail+0x23c/0x250 [ 2579.793503][T19544] __should_failslab+0x81/0x90 [ 2579.798340][T19544] should_failslab+0x5/0x20 [ 2579.802858][T19544] kmem_cache_alloc_node+0x61/0x2d0 [ 2579.808151][T19544] ? __alloc_skb+0xf0/0x450 [ 2579.812636][T19544] __alloc_skb+0xf0/0x450 [ 2579.816971][T19544] netlink_sendmsg+0x4fe/0x840 [ 2579.821813][T19544] ? netlink_getsockopt+0x720/0x720 [ 2579.827006][T19544] ____sys_sendmsg+0x39a/0x510 [ 2579.831758][T19544] __sys_sendmsg+0x195/0x230 [ 2579.836343][T19544] __x64_sys_sendmsg+0x42/0x50 [ 2579.841150][T19544] do_syscall_64+0x44/0xd0 [ 2579.845554][T19544] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2579.851494][T19544] RIP: 0033:0x7f3f1b516ae9 [ 2579.855888][T19544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2579.875546][T19544] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:35:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 4) [ 2579.884252][T19544] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2579.892209][T19544] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2579.900188][T19544] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2579.908145][T19544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2579.916112][T19544] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2579.924072][T19544] 03:35:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x3) 03:35:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x5}]}, 0x28}}, 0x0) 03:35:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:19 executing program 5: syz_io_uring_setup(0x18b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x330}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000040)) 03:35:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x8000000000000000) [ 2580.140175][T19563] FAULT_INJECTION: forcing a failure. [ 2580.140175][T19563] name failslab, interval 1, probability 0, space 0, times 0 [ 2580.152924][T19563] CPU: 1 PID: 19563 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2580.163086][T19563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2580.173152][T19563] Call Trace: [ 2580.176426][T19563] [ 2580.179359][T19563] dump_stack_lvl+0xd6/0x122 [ 2580.184006][T19563] dump_stack+0x11/0x1b [ 2580.188182][T19563] should_fail+0x23c/0x250 [ 2580.192580][T19563] __should_failslab+0x81/0x90 [ 2580.197339][T19563] should_failslab+0x5/0x20 [ 2580.201841][T19563] kmem_cache_alloc_node_trace+0x61/0x310 [ 2580.207943][T19563] ? __kmalloc_node_track_caller+0x30/0x40 [ 2580.213753][T19563] __kmalloc_node_track_caller+0x30/0x40 [ 2580.219431][T19563] ? netlink_sendmsg+0x4fe/0x840 [ 2580.224410][T19563] __alloc_skb+0x19d/0x450 [ 2580.228932][T19563] netlink_sendmsg+0x4fe/0x840 [ 2580.233776][T19563] ? netlink_getsockopt+0x720/0x720 [ 2580.238964][T19563] ____sys_sendmsg+0x39a/0x510 [ 2580.243779][T19563] __sys_sendmsg+0x195/0x230 [ 2580.248404][T19563] __x64_sys_sendmsg+0x42/0x50 [ 2580.253167][T19563] do_syscall_64+0x44/0xd0 [ 2580.257681][T19563] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2580.263636][T19563] RIP: 0033:0x7f3f1b516ae9 [ 2580.268044][T19563] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:35:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 5) 03:35:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x6}]}, 0x28}}, 0x0) [ 2580.287698][T19563] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2580.296140][T19563] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2580.304116][T19563] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2580.312093][T19563] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2580.320497][T19563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2580.328527][T19563] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2580.336588][T19563] 03:35:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x4) 03:35:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:20 executing program 5: r0 = memfd_secret(0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000080)='!\\\\:', 0x4) syz_io_uring_setup(0x41f9, &(0x7f00000002c0)={0x0, 0x43f2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f00000000c0), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x536, 0x101000) 03:35:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x8100000000000000) 03:35:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x5) 03:35:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x7}]}, 0x28}}, 0x0) 03:35:20 executing program 5: syz_io_uring_setup(0x18c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x18f}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2580.596132][T19601] FAULT_INJECTION: forcing a failure. [ 2580.596132][T19601] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2580.609198][T19601] CPU: 0 PID: 19601 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2580.619407][T19601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2580.629552][T19601] Call Trace: [ 2580.632852][T19601] [ 2580.635782][T19601] dump_stack_lvl+0xd6/0x122 [ 2580.640406][T19601] dump_stack+0x11/0x1b [ 2580.644630][T19601] should_fail+0x23c/0x250 [ 2580.649045][T19601] should_fail_usercopy+0x16/0x20 [ 2580.654058][T19601] _copy_from_iter+0x131/0x990 [ 2580.658823][T19601] ? check_stack_object+0x61/0x70 [ 2580.663903][T19601] ? __virt_addr_valid+0x15a/0x1a0 [ 2580.669026][T19601] ? __check_object_size+0x253/0x310 [ 2580.674312][T19601] netlink_sendmsg+0x5bb/0x840 [ 2580.679176][T19601] ? netlink_getsockopt+0x720/0x720 [ 2580.684449][T19601] ____sys_sendmsg+0x39a/0x510 [ 2580.689214][T19601] __sys_sendmsg+0x195/0x230 03:35:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x8}]}, 0x28}}, 0x0) [ 2580.693822][T19601] __x64_sys_sendmsg+0x42/0x50 [ 2580.698604][T19601] do_syscall_64+0x44/0xd0 [ 2580.703081][T19601] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2580.709111][T19601] RIP: 0033:0x7f3f1b516ae9 [ 2580.713515][T19601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2580.733191][T19601] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:35:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 6) 03:35:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x6) 03:35:20 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000000080)) readv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/31, 0x1f}, {&(0x7f0000000080)=""/35, 0x23}, {&(0x7f00000000c0)=""/94, 0x5e}, {&(0x7f00000001c0)=""/143, 0x8f}], 0x4) [ 2580.741604][T19601] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2580.749692][T19601] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2580.757741][T19601] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2580.765725][T19601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2580.773688][T19601] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2580.781696][T19601] 03:35:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x9}]}, 0x28}}, 0x0) 03:35:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x7) 03:35:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x81ffffff00000000) [ 2580.897276][T19626] FAULT_INJECTION: forcing a failure. [ 2580.897276][T19626] name failslab, interval 1, probability 0, space 0, times 0 [ 2580.910094][T19626] CPU: 1 PID: 19626 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2580.920359][T19626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2580.930460][T19626] Call Trace: [ 2580.933722][T19626] [ 2580.936669][T19626] dump_stack_lvl+0xd6/0x122 [ 2580.941241][T19626] dump_stack+0x11/0x1b [ 2580.945382][T19626] should_fail+0x23c/0x250 [ 2580.949862][T19626] ? skb_clone+0x12c/0x1f0 [ 2580.954373][T19626] __should_failslab+0x81/0x90 [ 2580.959178][T19626] should_failslab+0x5/0x20 [ 2580.963765][T19626] kmem_cache_alloc+0x4f/0x320 [ 2580.968517][T19626] skb_clone+0x12c/0x1f0 [ 2580.972800][T19626] netlink_deliver_tap+0x2da/0x510 [ 2580.978146][T19626] netlink_unicast+0x5de/0x6c0 [ 2580.983034][T19626] netlink_sendmsg+0x726/0x840 [ 2580.987798][T19626] ? netlink_getsockopt+0x720/0x720 [ 2580.993225][T19626] ____sys_sendmsg+0x39a/0x510 [ 2580.997975][T19626] __sys_sendmsg+0x195/0x230 [ 2581.002614][T19626] __x64_sys_sendmsg+0x42/0x50 [ 2581.007377][T19626] do_syscall_64+0x44/0xd0 [ 2581.012262][T19626] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2581.018161][T19626] RIP: 0033:0x7f3f1b516ae9 [ 2581.022577][T19626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2581.042170][T19626] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2581.050591][T19626] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2581.058560][T19626] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2581.066593][T19626] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2581.076415][T19626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2581.084411][T19626] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2581.092454][T19626] 03:35:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 7) [ 2581.104357][T19626] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2581.114136][T19626] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:20 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0xa}]}, 0x28}}, 0x0) 03:35:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x8) [ 2581.324593][T19670] FAULT_INJECTION: forcing a failure. [ 2581.324593][T19670] name failslab, interval 1, probability 0, space 0, times 0 [ 2581.337319][T19670] CPU: 0 PID: 19670 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2581.348115][T19670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2581.358258][T19670] Call Trace: [ 2581.361569][T19670] [ 2581.364495][T19670] dump_stack_lvl+0xd6/0x122 [ 2581.369132][T19670] dump_stack+0x11/0x1b [ 2581.373292][T19670] should_fail+0x23c/0x250 [ 2581.377712][T19670] ? rtnl_newlink+0x59/0x13b0 [ 2581.382420][T19670] __should_failslab+0x81/0x90 [ 2581.387390][T19670] should_failslab+0x5/0x20 [ 2581.391957][T19670] kmem_cache_alloc_trace+0x52/0x350 [ 2581.397248][T19670] rtnl_newlink+0x59/0x13b0 [ 2581.401770][T19670] ? __rcu_read_unlock+0x5c/0x290 [ 2581.406819][T19670] ? __rcu_read_unlock+0x5c/0x290 [ 2581.411847][T19670] ? avc_has_perm_noaudit+0x1c0/0x270 [ 2581.417252][T19670] ? cred_has_capability+0x10a/0x240 [ 2581.422551][T19670] ? cred_has_capability+0x1df/0x240 [ 2581.427843][T19670] ? selinux_capable+0x34/0x40 [ 2581.432607][T19670] ? security_capable+0x91/0xa0 [ 2581.437455][T19670] ? __rcu_read_unlock+0x5c/0x290 [ 2581.442478][T19670] ? rtnl_setlink+0x2a0/0x2a0 [ 2581.447153][T19670] rtnetlink_rcv_msg+0x745/0x7e0 [ 2581.452095][T19670] ? ___cache_free+0x46/0x300 [ 2581.456776][T19670] ? kmem_cache_free+0x65/0x110 [ 2581.461629][T19670] ? __kfree_skb+0xfe/0x150 [ 2581.466171][T19670] ? consume_skb+0x48/0x160 [ 2581.470682][T19670] ? nlmon_xmit+0x5f/0x70 03:35:21 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r2 = gettid() perf_event_open(&(0x7f0000000080)={0x5b437f70b7c6f45d, 0x80, 0x7, 0x20, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfff, 0x4, @perf_config_ext={0x2, 0x20}, 0x8000, 0xfffffffffffeffff, 0x0, 0x1, 0x1000, 0x9, 0x2, 0x0, 0x5, 0x0, 0x66cc}, r2, 0xa, 0xffffffffffffffff, 0x2) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x1, r2}) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2581.475034][T19670] ? __this_cpu_preempt_check+0x18/0x20 [ 2581.480646][T19670] ? __local_bh_enable_ip+0x4d/0x70 [ 2581.485872][T19670] ? local_bh_enable+0x1b/0x20 [ 2581.490674][T19670] ? __dev_queue_xmit+0x597/0xf70 [ 2581.495730][T19670] ? __skb_clone+0x2db/0x300 [ 2581.500331][T19670] ? __rcu_read_unlock+0x5c/0x290 [ 2581.505383][T19670] netlink_rcv_skb+0x14e/0x250 [ 2581.510196][T19670] ? rtnetlink_bind+0x60/0x60 [ 2581.514893][T19670] rtnetlink_rcv+0x18/0x20 [ 2581.519308][T19670] netlink_unicast+0x5fc/0x6c0 03:35:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x9) [ 2581.524176][T19670] netlink_sendmsg+0x726/0x840 [ 2581.529063][T19670] ? netlink_getsockopt+0x720/0x720 [ 2581.534275][T19670] ____sys_sendmsg+0x39a/0x510 [ 2581.539048][T19670] __sys_sendmsg+0x195/0x230 [ 2581.543661][T19670] __x64_sys_sendmsg+0x42/0x50 [ 2581.548576][T19670] do_syscall_64+0x44/0xd0 [ 2581.553099][T19670] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2581.558989][T19670] RIP: 0033:0x7f3f1b516ae9 03:35:21 executing program 5: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x20, 0x1, 0x0, 0x0, r0}, &(0x7f0000ef2000/0x1000)=nil, &(0x7f0000eed000/0x4000)=nil, &(0x7f0000000080), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2581.563389][T19670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2581.583094][T19670] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2581.591507][T19670] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2581.599566][T19670] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2581.607539][T19670] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2581.617505][T19670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 03:35:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xa) 03:35:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x8847000000000000) 03:35:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0xc}]}, 0x28}}, 0x0) 03:35:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 8) [ 2581.625505][T19670] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2581.633483][T19670] 03:35:21 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x40047211, &(0x7f0000000040)=0x20) 03:35:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xb) 03:35:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0xf}]}, 0x28}}, 0x0) [ 2581.772871][T19726] FAULT_INJECTION: forcing a failure. [ 2581.772871][T19726] name failslab, interval 1, probability 0, space 0, times 0 [ 2581.785598][T19726] CPU: 0 PID: 19726 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2581.795878][T19726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2581.805960][T19726] Call Trace: [ 2581.809239][T19726] [ 2581.812217][T19726] dump_stack_lvl+0xd6/0x122 [ 2581.816865][T19726] dump_stack+0x11/0x1b [ 2581.821073][T19726] should_fail+0x23c/0x250 [ 2581.825504][T19726] __should_failslab+0x81/0x90 [ 2581.830582][T19726] should_failslab+0x5/0x20 [ 2581.835087][T19726] kmem_cache_alloc_node+0x61/0x2d0 [ 2581.840550][T19726] ? __rcu_read_unlock+0x5c/0x290 [ 2581.846097][T19726] ? fib_sync_up+0x51c/0x550 [ 2581.850798][T19726] ? __alloc_skb+0xf0/0x450 [ 2581.855311][T19726] __alloc_skb+0xf0/0x450 [ 2581.859652][T19726] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2581.864940][T19726] rtmsg_ifinfo+0x58/0xc0 [ 2581.869387][T19726] netdev_state_change+0x115/0x170 [ 2581.874488][T19726] do_setlink+0x24a/0x2410 [ 2581.878998][T19726] ? __nla_validate_parse+0x108f/0x1760 [ 2581.884547][T19726] ? __nla_parse+0x3c/0x50 [ 2581.889020][T19726] rtnl_newlink+0xb10/0x13b0 [ 2581.893620][T19726] ? __rcu_read_unlock+0x5c/0x290 [ 2581.898851][T19726] ? rtnl_setlink+0x2a0/0x2a0 [ 2581.903655][T19726] rtnetlink_rcv_msg+0x745/0x7e0 [ 2581.908608][T19726] ? ___cache_free+0x46/0x300 [ 2581.913287][T19726] ? kmem_cache_free+0x65/0x110 [ 2581.918311][T19726] ? __kfree_skb+0xfe/0x150 03:35:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xc) 03:35:21 executing program 5: prctl$PR_GET_FPEMU(0x9, &(0x7f0000000100)) syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000080)=@IORING_OP_OPENAT={0x12, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)='./file0\x00', 0x41, 0x201, 0x23456}, 0x400) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') syz_io_uring_submit(r0, 0x0, &(0x7f00000000c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x8) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000140)) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000080)) r3 = accept4$x25(r1, 0x0, &(0x7f0000000200), 0x80000) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x7}}, './file0\x00'}) [ 2581.922899][T19726] ? consume_skb+0x48/0x160 [ 2581.927417][T19726] ? nlmon_xmit+0x5f/0x70 [ 2581.931903][T19726] ? __this_cpu_preempt_check+0x18/0x20 [ 2581.937542][T19726] ? __local_bh_enable_ip+0x4d/0x70 [ 2581.942818][T19726] ? local_bh_enable+0x1b/0x20 [ 2581.947583][T19726] ? __dev_queue_xmit+0x597/0xf70 [ 2581.952624][T19726] ? __skb_clone+0x2db/0x300 [ 2581.957291][T19726] ? __rcu_read_unlock+0x5c/0x290 [ 2581.962437][T19726] netlink_rcv_skb+0x14e/0x250 [ 2581.967198][T19726] ? rtnetlink_bind+0x60/0x60 [ 2581.971913][T19726] rtnetlink_rcv+0x18/0x20 [ 2581.976338][T19726] netlink_unicast+0x5fc/0x6c0 [ 2581.981178][T19726] netlink_sendmsg+0x726/0x840 [ 2581.985996][T19726] ? netlink_getsockopt+0x720/0x720 [ 2581.991320][T19726] ____sys_sendmsg+0x39a/0x510 [ 2581.996147][T19726] __sys_sendmsg+0x195/0x230 [ 2582.000849][T19726] __x64_sys_sendmsg+0x42/0x50 [ 2582.005620][T19726] do_syscall_64+0x44/0xd0 [ 2582.010090][T19726] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2582.016011][T19726] RIP: 0033:0x7f3f1b516ae9 03:35:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xd) 03:35:21 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xe0000, 0x0) syz_io_uring_setup(0x1aa3, &(0x7f0000000080)={0x0, 0xf41, 0x38, 0x1, 0x6a, 0x0, r1}, &(0x7f0000ef0000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2582.020516][T19726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2582.040246][T19726] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2582.048814][T19726] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2582.056927][T19726] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2582.064981][T19726] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 03:35:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xe) [ 2582.072953][T19726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2582.081019][T19726] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2582.089056][T19726] [ 2582.100195][T19726] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2582.110376][T19726] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x8848000000000000) 03:35:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x10}]}, 0x28}}, 0x0) 03:35:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 9) 03:35:21 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = io_uring_setup(0xe0c, &(0x7f0000000040)={0x0, 0xc584, 0x4, 0x0, 0x2e1}) mmap$IORING_OFF_SQES(&(0x7f0000ef2000/0x1000)=nil, 0x1000, 0x8, 0x11, r0, 0x10000000) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x10) 03:35:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x21}]}, 0x28}}, 0x0) [ 2582.290365][T19781] FAULT_INJECTION: forcing a failure. [ 2582.290365][T19781] name failslab, interval 1, probability 0, space 0, times 0 [ 2582.303230][T19781] CPU: 0 PID: 19781 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2582.314142][T19781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2582.324535][T19781] Call Trace: [ 2582.327798][T19781] [ 2582.330822][T19781] dump_stack_lvl+0xd6/0x122 [ 2582.335415][T19781] dump_stack+0x11/0x1b [ 2582.339600][T19781] should_fail+0x23c/0x250 [ 2582.344085][T19781] __should_failslab+0x81/0x90 [ 2582.348842][T19781] should_failslab+0x5/0x20 [ 2582.353407][T19781] kmem_cache_alloc_node_trace+0x61/0x310 [ 2582.359159][T19781] ? __kmalloc_node_track_caller+0x30/0x40 [ 2582.365019][T19781] __kmalloc_node_track_caller+0x30/0x40 [ 2582.370655][T19781] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2582.376118][T19781] __alloc_skb+0x19d/0x450 [ 2582.380542][T19781] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2582.385898][T19781] rtmsg_ifinfo+0x58/0xc0 03:35:22 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eee000/0x3000)=nil, &(0x7f0000000000)=0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='smaps\x00') syz_io_uring_setup(0x3d8c, &(0x7f0000000040)={0x0, 0x753c, 0x20, 0x0, 0x2eb, 0x0, r1}, &(0x7f0000ef8000/0x3000)=nil, &(0x7f0000ef5000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r0, r2, &(0x7f0000000140)=@IORING_OP_FADVISE={0x18, 0x4, 0x0, @fd, 0x5, 0x0, 0x401, 0x1, 0x0, {0x0, r3}}, 0x80000000) 03:35:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x11) [ 2582.390249][T19781] netdev_state_change+0x115/0x170 [ 2582.395495][T19781] do_setlink+0x24a/0x2410 [ 2582.399952][T19781] ? __nla_validate_parse+0x108f/0x1760 [ 2582.405504][T19781] ? __nla_parse+0x3c/0x50 [ 2582.410091][T19781] rtnl_newlink+0xb10/0x13b0 [ 2582.414690][T19781] ? __rcu_read_unlock+0x5c/0x290 [ 2582.419714][T19781] ? rtnl_setlink+0x2a0/0x2a0 [ 2582.424397][T19781] rtnetlink_rcv_msg+0x745/0x7e0 [ 2582.429343][T19781] ? ___cache_free+0x46/0x300 [ 2582.434134][T19781] ? kmem_cache_free+0x65/0x110 [ 2582.438986][T19781] ? __kfree_skb+0xfe/0x150 [ 2582.443474][T19781] ? consume_skb+0x48/0x160 [ 2582.448115][T19781] ? nlmon_xmit+0x5f/0x70 [ 2582.452457][T19781] ? __this_cpu_preempt_check+0x18/0x20 [ 2582.458037][T19781] ? __local_bh_enable_ip+0x4d/0x70 [ 2582.463281][T19781] ? local_bh_enable+0x1b/0x20 [ 2582.468048][T19781] ? __dev_queue_xmit+0x597/0xf70 [ 2582.473063][T19781] ? __skb_clone+0x2db/0x300 [ 2582.477656][T19781] ? __rcu_read_unlock+0x5c/0x290 [ 2582.482675][T19781] netlink_rcv_skb+0x14e/0x250 03:35:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x12) 03:35:22 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x373}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) preadv(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2582.487495][T19781] ? rtnetlink_bind+0x60/0x60 [ 2582.492199][T19781] rtnetlink_rcv+0x18/0x20 [ 2582.496619][T19781] netlink_unicast+0x5fc/0x6c0 [ 2582.501507][T19781] netlink_sendmsg+0x726/0x840 [ 2582.506287][T19781] ? netlink_getsockopt+0x720/0x720 [ 2582.511590][T19781] ____sys_sendmsg+0x39a/0x510 [ 2582.516472][T19781] __sys_sendmsg+0x195/0x230 [ 2582.521139][T19781] __x64_sys_sendmsg+0x42/0x50 [ 2582.525952][T19781] do_syscall_64+0x44/0xd0 [ 2582.530410][T19781] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2582.536316][T19781] RIP: 0033:0x7f3f1b516ae9 [ 2582.540876][T19781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2582.560702][T19781] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2582.569118][T19781] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2582.577095][T19781] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 03:35:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x21) [ 2582.585062][T19781] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2582.593032][T19781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2582.600998][T19781] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2582.609028][T19781] [ 2582.619107][T19781] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 10) 03:35:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x60}]}, 0x28}}, 0x0) 03:35:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x88a8ffff00000000) 03:35:22 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x33a9, &(0x7f0000001b40)={0x0, 0x2d65, 0x8, 0x3, 0xf1}, &(0x7f0000ef5000/0x2000)=nil, &(0x7f0000ef6000/0x1000)=nil, &(0x7f0000001bc0), &(0x7f0000001c00)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f0000001b00)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000001a80)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) io_uring_enter(r3, 0xf3e, 0x562a, 0x2, &(0x7f0000001ac0)={[0x7f]}, 0x8) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r1, 0x4010942a, &(0x7f00000015c0)={0x1, 0x200}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001a00)={r4, &(0x7f0000001900)="9e8d86a2", &(0x7f0000001940)=""/138}, 0x20) r5 = dup2(r0, r2) fallocate(r5, 0x10, 0xc1, 0x7f) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000080)=@req3={0x80000000, 0x1, 0x80, 0x1, 0xbc, 0x6, 0x2}, 0x1c) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001880)={0x53, 0xfffffffffffffffd, 0x5a, 0x6, @scatter={0xa, 0x0, &(0x7f0000001700)=[{&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000100)=""/32, 0x20}, {&(0x7f00000001c0)=""/123, 0x7b}, {&(0x7f0000000340)=""/172, 0xac}, {&(0x7f0000000240)=""/103, 0x67}, {&(0x7f0000000400)=""/220, 0xdc}, {&(0x7f0000000140)}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/37, 0x25}, {&(0x7f0000001600)=""/243, 0xf3}]}, &(0x7f0000001540)="d2ed194bfcefec5131734fdab4258652c070774091a694ed06627ec9804959bf0caabc924da8d9bbb836aa76e94bf457c2deff1a2ef76216e3c59fa2860403da7ff00d711168a83b2a07a43b2d2f69ac25e231d3518f85b20bea", &(0x7f00000017c0)=""/88, 0x401, 0x22, 0x2, &(0x7f0000001840)}) syz_open_procfs(0x0, &(0x7f0000000140)='net/nfsfs\x00') [ 2582.633538][T19781] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2582.653988][T19784] __nla_validate_parse: 34 callbacks suppressed [ 2582.654012][T19784] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x25) 03:35:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2582.807570][T19832] FAULT_INJECTION: forcing a failure. [ 2582.807570][T19832] name failslab, interval 1, probability 0, space 0, times 0 [ 2582.820323][T19832] CPU: 0 PID: 19832 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2582.830540][T19832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2582.840669][T19832] Call Trace: [ 2582.843948][T19832] [ 2582.846896][T19832] dump_stack_lvl+0xd6/0x122 [ 2582.851343][T19836] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2582.851488][T19832] dump_stack+0x11/0x1b [ 2582.851510][T19832] should_fail+0x23c/0x250 [ 2582.851530][T19832] __should_failslab+0x81/0x90 [ 2582.851551][T19832] should_failslab+0x5/0x20 [ 2582.851622][T19832] kmem_cache_alloc_node_trace+0x61/0x310 [ 2582.884679][T19832] ? __kmalloc_node_track_caller+0x30/0x40 [ 2582.890491][T19832] __kmalloc_node_track_caller+0x30/0x40 [ 2582.896132][T19832] ? netlink_trim+0x112/0x140 [ 2582.896204][T19832] pskb_expand_head+0xca/0x8b0 03:35:22 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd_index=0x8, 0x9, {0x0, r2}, 0x10001, 0x9, 0x0, {0x0, 0x0, r0}}, 0x3ff) 03:35:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x48) [ 2582.896223][T19832] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2582.896246][T19832] netlink_trim+0x112/0x140 [ 2582.896335][T19832] netlink_broadcast+0x42/0xad0 [ 2582.896361][T19832] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2582.896436][T19832] nlmsg_notify+0xc7/0x170 [ 2582.896459][T19832] rtmsg_ifinfo+0xa4/0xc0 [ 2582.934652][T19832] netdev_state_change+0x115/0x170 [ 2582.939777][T19832] do_setlink+0x24a/0x2410 [ 2582.944238][T19832] ? __nla_validate_parse+0x108f/0x1760 [ 2582.949835][T19832] ? __nla_parse+0x3c/0x50 [ 2582.954327][T19832] rtnl_newlink+0xb10/0x13b0 [ 2582.959293][T19832] ? __rcu_read_unlock+0x5c/0x290 [ 2582.964641][T19832] ? rtnl_setlink+0x2a0/0x2a0 [ 2582.969303][T19832] rtnetlink_rcv_msg+0x745/0x7e0 [ 2582.974251][T19832] ? ___cache_free+0x46/0x300 [ 2582.978978][T19832] ? kmem_cache_free+0x65/0x110 [ 2582.983829][T19832] ? __kfree_skb+0xfe/0x150 [ 2582.988412][T19832] ? consume_skb+0x48/0x160 [ 2582.992989][T19832] ? nlmon_xmit+0x5f/0x70 [ 2582.997366][T19832] ? __this_cpu_preempt_check+0x18/0x20 [ 2583.002916][T19832] ? __local_bh_enable_ip+0x4d/0x70 [ 2583.008382][T19832] ? local_bh_enable+0x1b/0x20 [ 2583.013554][T19832] ? __dev_queue_xmit+0x597/0xf70 [ 2583.018690][T19832] ? __skb_clone+0x2db/0x300 [ 2583.023356][T19832] ? __rcu_read_unlock+0x5c/0x290 [ 2583.028458][T19832] netlink_rcv_skb+0x14e/0x250 [ 2583.033236][T19832] ? rtnetlink_bind+0x60/0x60 [ 2583.037957][T19832] rtnetlink_rcv+0x18/0x20 [ 2583.042441][T19832] netlink_unicast+0x5fc/0x6c0 [ 2583.047230][T19832] netlink_sendmsg+0x726/0x840 [ 2583.052158][T19832] ? netlink_getsockopt+0x720/0x720 03:35:22 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) r3 = socket(0x10, 0x80002, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r3, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000000b80)=ANY=[@ANYBLOB="1ad5a4d0ad8fe763972a0bade0fc8f6c1ae4c395ac824070e94eb9288f882d47adc16d5fc31b6060e7d57a4e1f9a54035eafb978a81b51d783d46c1808458c6aa46fd4be1253bb085ca8c90af918d73ce3e793f671b5c1f1d123f018aa29e390a2856b761889f7bbdcc54c5a7d5881324be5b1654b20ef3ac784c3a5f37ca8f6f46d2bbbb9cb26547ed6f20970644bc1ee5a1bba354ca2eed1b88d393d0dc8eba16bc60acf64a9a8b55ca1ed176d5ec62c7265187cf1d630fa7ac214ffd86c593b3bb07d1814052830999f9711c70a86", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c84cf4332c14f6e2c2abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f760fcd648fa65655768fc440a61be189e36e2f665b20a01dd1e2c3be9c9a6964741360a8197159a9bd96249bfabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4070000000000000000350fc1ed23df9b81f7fc86789044346b52bc322d1253e1322acfa80fe7fad150a59775f6b9d2ae327fefd3ff27eae1bcceab2c49a9bc9d18bc284d53b292da1a25cb286e595a54541ca8e7709231522e2c37de29a1135ad3530f01518fe6a55abcc0caed199c708122ee37689310bb1b5214ab7e8aab8363b3156c72fccf274e2d38d463f6189349f31e7b7d1f4be4cd7ee40a37025992200e1fbfb46cd310c722", @ANYRES32=r3, @ANYRES16=r2, @ANYRESOCT=r3, @ANYRES32=r5, @ANYRES64=r6, @ANYBLOB="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"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) syz_io_uring_submit(r0, r5, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x4, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x1000) 03:35:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x4c) [ 2583.057377][T19832] ____sys_sendmsg+0x39a/0x510 [ 2583.062217][T19832] __sys_sendmsg+0x195/0x230 [ 2583.066828][T19832] __x64_sys_sendmsg+0x42/0x50 [ 2583.071658][T19832] do_syscall_64+0x44/0xd0 [ 2583.076576][T19832] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2583.082533][T19832] RIP: 0033:0x7f3f1b516ae9 [ 2583.086943][T19832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2583.106774][T19832] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2583.115249][T19832] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2583.123289][T19832] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2583.131257][T19832] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2583.139265][T19832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2583.147218][T19832] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2583.155178][T19832] 03:35:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x68) [ 2583.166083][T19832] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2583.183081][T19832] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 11) 03:35:22 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x20}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000002, 0x10, r0, 0x8000000) syz_io_uring_submit(r2, 0x0, &(0x7f0000000140)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x12345}, 0x3ff) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) r4 = syz_open_dev$vcsu(&(0x7f0000000080), 0xb47b, 0x4080) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, 0x3589}}, 0x18) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r3, 0x0) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f00000001c0)='-\x00', 0x0, r0) 03:35:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x300}]}, 0x28}}, 0x0) 03:35:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x9effffff00000000) 03:35:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2583.212243][T19836] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x6c) 03:35:23 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x80010, r0, 0x10000000) r3 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ef3000/0x2000)=nil, 0x2000, 0x0, 0x2010, r3, 0x0) syz_io_uring_submit(r7, r2, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x2, 0x4007, @fd_index=0x3, 0x4, &(0x7f00000003c0)="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", 0x1000, 0x14, 0x1, {0x0, r6}}, 0x7) syz_io_uring_submit(r4, r5, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r6}}, 0x10001) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_STATX={0x15, 0x2, 0x0, 0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x40, 0xa000, 0x0, {0x0, r6}}, 0x200) syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') 03:35:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x500}]}, 0x28}}, 0x0) 03:35:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2583.352061][T19888] FAULT_INJECTION: forcing a failure. [ 2583.352061][T19888] name failslab, interval 1, probability 0, space 0, times 0 [ 2583.364723][T19888] CPU: 0 PID: 19888 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2583.375051][T19888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2583.385104][T19888] Call Trace: [ 2583.388383][T19888] [ 2583.391314][T19888] dump_stack_lvl+0xd6/0x122 [ 2583.395932][T19888] dump_stack+0x11/0x1b [ 2583.400380][T19888] should_fail+0x23c/0x250 [ 2583.404834][T19888] __should_failslab+0x81/0x90 [ 2583.409684][T19888] should_failslab+0x5/0x20 [ 2583.414236][T19888] kmem_cache_alloc_node+0x61/0x2d0 [ 2583.419431][T19888] ? __rcu_read_unlock+0x5c/0x290 [ 2583.424471][T19888] ? fib_sync_up+0x51c/0x550 [ 2583.429111][T19888] ? __alloc_skb+0xf0/0x450 [ 2583.433603][T19888] __alloc_skb+0xf0/0x450 [ 2583.437919][T19888] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2583.443316][T19888] rtmsg_ifinfo+0x58/0xc0 [ 2583.445408][T19891] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2583.447656][T19888] netdev_state_change+0x115/0x170 [ 2583.447686][T19888] do_setlink+0x24a/0x2410 [ 2583.447749][T19888] ? __nla_validate_parse+0x108f/0x1760 [ 2583.447772][T19888] ? __nla_parse+0x3c/0x50 [ 2583.447793][T19888] rtnl_newlink+0xb10/0x13b0 [ 2583.447897][T19888] ? __rcu_read_unlock+0x5c/0x290 [ 2583.447949][T19888] ? rtnl_setlink+0x2a0/0x2a0 [ 2583.491028][T19888] rtnetlink_rcv_msg+0x745/0x7e0 [ 2583.496066][T19888] ? ___cache_free+0x46/0x300 03:35:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x74) [ 2583.500830][T19888] ? kmem_cache_free+0x65/0x110 [ 2583.505684][T19888] ? __kfree_skb+0xfe/0x150 [ 2583.510274][T19888] ? consume_skb+0x48/0x160 [ 2583.514790][T19888] ? nlmon_xmit+0x5f/0x70 [ 2583.519188][T19888] ? __this_cpu_preempt_check+0x18/0x20 [ 2583.524883][T19888] ? __local_bh_enable_ip+0x4d/0x70 [ 2583.530135][T19888] ? local_bh_enable+0x1b/0x20 [ 2583.535039][T19888] ? __dev_queue_xmit+0x597/0xf70 [ 2583.540408][T19888] ? __skb_clone+0x2db/0x300 [ 2583.544995][T19888] ? __rcu_read_unlock+0x5c/0x290 03:35:23 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x11, 0x3}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000ef9000/0x2000)=nil, &(0x7f0000000000)=0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f66686c65305e2d262a5c0b033a159fba6ddcc124200a91"], 0x16) preadv(r1, &(0x7f00000015c0), 0x100000000000023a, 0x4800, 0x0) syz_io_uring_setup(0x319, &(0x7f00000000c0)={0x0, 0xd8f4, 0x1, 0x3, 0x193}, &(0x7f0000ef9000/0x2000)=nil, &(0x7f0000ef7000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r2, &(0x7f0000000240)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x2, 0x0, 0x20, 0x3, &(0x7f00000001c0)="01a983bd931bc1c7f8f5c9414875a4286e318d0fd394dada705f34e0e5726f2c8efd7e982e9aa77ef5c1bfe5c3c70c23d890011c7ab06e1ffdfa1db3cd6f62b142fce8f9b95ab9dbc4662188996d4508cada64fd42f60b62c43db33bdddc4a6fe77afb2375", 0x4, 0x0, 0x0, {0x2}}, 0xfffffffe) [ 2583.550186][T19888] netlink_rcv_skb+0x14e/0x250 [ 2583.554966][T19888] ? rtnetlink_bind+0x60/0x60 [ 2583.559651][T19888] rtnetlink_rcv+0x18/0x20 [ 2583.564073][T19888] netlink_unicast+0x5fc/0x6c0 [ 2583.568840][T19888] netlink_sendmsg+0x726/0x840 [ 2583.573644][T19888] ? netlink_getsockopt+0x720/0x720 [ 2583.578848][T19888] ____sys_sendmsg+0x39a/0x510 [ 2583.583739][T19888] __sys_sendmsg+0x195/0x230 [ 2583.588341][T19888] __x64_sys_sendmsg+0x42/0x50 [ 2583.593504][T19888] do_syscall_64+0x44/0xd0 03:35:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x7a) [ 2583.597922][T19888] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2583.603852][T19888] RIP: 0033:0x7f3f1b516ae9 [ 2583.608330][T19888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2583.627970][T19888] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2583.636473][T19888] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2583.644463][T19888] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2583.652460][T19888] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2583.660496][T19888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2583.668492][T19888] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2583.676486][T19888] [ 2583.686965][T19888] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 12) 03:35:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x5c3}]}, 0x28}}, 0x0) 03:35:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xc305000000000000) 03:35:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x300) [ 2583.697389][T19888] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2583.725584][T19891] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x600}]}, 0x28}}, 0x0) 03:35:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2583.866323][T19936] FAULT_INJECTION: forcing a failure. [ 2583.866323][T19936] name failslab, interval 1, probability 0, space 0, times 0 [ 2583.879039][T19936] CPU: 0 PID: 19936 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2583.889266][T19936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2583.899332][T19936] Call Trace: [ 2583.902607][T19936] [ 2583.905627][T19936] dump_stack_lvl+0xd6/0x122 [ 2583.910296][T19936] dump_stack+0x11/0x1b 03:35:23 executing program 5: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2583.914457][T19936] should_fail+0x23c/0x250 [ 2583.918883][T19936] __should_failslab+0x81/0x90 [ 2583.923708][T19936] should_failslab+0x5/0x20 [ 2583.928216][T19936] kmem_cache_alloc_node_trace+0x61/0x310 [ 2583.933965][T19936] ? __kmalloc_node_track_caller+0x30/0x40 [ 2583.938906][T19940] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2583.939929][T19936] __kmalloc_node_track_caller+0x30/0x40 [ 2583.939997][T19936] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2583.940051][T19936] __alloc_skb+0x19d/0x450 03:35:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x500) [ 2583.940079][T19936] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2583.940128][T19936] rtmsg_ifinfo+0x58/0xc0 [ 2583.940149][T19936] netdev_state_change+0x115/0x170 [ 2583.940175][T19936] do_setlink+0x24a/0x2410 [ 2583.940198][T19936] ? __nla_validate_parse+0x108f/0x1760 [ 2583.940251][T19936] ? __nla_parse+0x3c/0x50 [ 2583.995503][T19936] rtnl_newlink+0xb10/0x13b0 [ 2584.000100][T19936] ? __rcu_read_unlock+0x5c/0x290 [ 2584.005218][T19936] ? rtnl_setlink+0x2a0/0x2a0 [ 2584.009894][T19936] rtnetlink_rcv_msg+0x745/0x7e0 [ 2584.014880][T19936] ? ___cache_free+0x46/0x300 [ 2584.019540][T19936] ? kmem_cache_free+0x65/0x110 [ 2584.024437][T19936] ? __kfree_skb+0xfe/0x150 [ 2584.028967][T19936] ? consume_skb+0x48/0x160 [ 2584.033469][T19936] ? nlmon_xmit+0x5f/0x70 [ 2584.037939][T19936] ? __this_cpu_preempt_check+0x18/0x20 [ 2584.043537][T19936] ? __local_bh_enable_ip+0x4d/0x70 [ 2584.048857][T19936] ? local_bh_enable+0x1b/0x20 [ 2584.053757][T19936] ? __dev_queue_xmit+0x597/0xf70 [ 2584.058940][T19936] ? __skb_clone+0x2db/0x300 03:35:23 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r3, 0x6, 0x9, 0x0, &(0x7f0000000080)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, r3, &(0x7f0000000040)=0x80, &(0x7f0000000080)=@in={0x2, 0x0, @empty}, 0x0, 0x0, 0x1}, 0x4) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x600) [ 2584.063609][T19936] ? __rcu_read_unlock+0x5c/0x290 [ 2584.068636][T19936] netlink_rcv_skb+0x14e/0x250 [ 2584.073431][T19936] ? rtnetlink_bind+0x60/0x60 [ 2584.078122][T19936] rtnetlink_rcv+0x18/0x20 [ 2584.082541][T19936] netlink_unicast+0x5fc/0x6c0 [ 2584.087544][T19936] netlink_sendmsg+0x726/0x840 [ 2584.092332][T19936] ? netlink_getsockopt+0x720/0x720 [ 2584.097606][T19936] ____sys_sendmsg+0x39a/0x510 [ 2584.102510][T19936] __sys_sendmsg+0x195/0x230 [ 2584.107195][T19936] __x64_sys_sendmsg+0x42/0x50 [ 2584.112000][T19936] do_syscall_64+0x44/0xd0 [ 2584.116482][T19936] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2584.122391][T19936] RIP: 0033:0x7f3f1b516ae9 [ 2584.126821][T19936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2584.146611][T19936] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2584.155027][T19936] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2584.163009][T19936] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2584.171073][T19936] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2584.179048][T19936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2584.187020][T19936] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2584.195053][T19936] [ 2584.206872][T19936] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 13) 03:35:23 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x10}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000040), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x700) 03:35:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x700}]}, 0x28}}, 0x0) 03:35:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000007000001", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xc3ffffff00000000) [ 2584.217881][T19936] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x900) 03:35:24 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getpeername(r1, &(0x7f0000000040)=@tipc=@name, &(0x7f00000000c0)=0x80) 03:35:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000007000001", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x900}]}, 0x28}}, 0x0) [ 2584.384311][T19974] FAULT_INJECTION: forcing a failure. [ 2584.384311][T19974] name failslab, interval 1, probability 0, space 0, times 0 [ 2584.397027][T19974] CPU: 0 PID: 19974 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2584.407160][T19974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2584.410488][T19975] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2584.417374][T19974] Call Trace: [ 2584.417383][T19974] [ 2584.417389][T19974] dump_stack_lvl+0xd6/0x122 [ 2584.417413][T19974] dump_stack+0x11/0x1b [ 2584.417486][T19974] should_fail+0x23c/0x250 [ 2584.417505][T19974] __should_failslab+0x81/0x90 [ 2584.417527][T19974] should_failslab+0x5/0x20 [ 2584.455619][T19974] kmem_cache_alloc_node_trace+0x61/0x310 [ 2584.461654][T19974] ? __kmalloc_node_track_caller+0x30/0x40 [ 2584.467567][T19974] __kmalloc_node_track_caller+0x30/0x40 [ 2584.473616][T19974] ? netlink_trim+0x112/0x140 [ 2584.478418][T19974] pskb_expand_head+0xca/0x8b0 03:35:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xa00) [ 2584.483173][T19974] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2584.488443][T19974] netlink_trim+0x112/0x140 [ 2584.492950][T19974] netlink_broadcast+0x42/0xad0 [ 2584.497809][T19974] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2584.503341][T19974] nlmsg_notify+0xc7/0x170 [ 2584.507756][T19974] rtmsg_ifinfo+0xa4/0xc0 [ 2584.512087][T19974] netdev_state_change+0x115/0x170 [ 2584.517204][T19974] do_setlink+0x24a/0x2410 [ 2584.521624][T19974] ? __nla_validate_parse+0x108f/0x1760 [ 2584.527302][T19974] ? __nla_parse+0x3c/0x50 03:35:24 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x3, &(0x7f0000000040)={0x0, 0xec14, 0x1, 0x0, 0x8b, 0x0, r0}, &(0x7f0000ef1000/0x4000)=nil, &(0x7f0000eed000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r3, &(0x7f0000001800)=@IORING_OP_WRITEV={0x2, 0x1, 0x4000, @fd_index=0xa, 0x3a1, &(0x7f0000001540)=[{&(0x7f0000000340)="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", 0x1000}, {&(0x7f00000001c0)="08b9b95d935a9e6fbcd3eb3fcb4fbcd78f1c0b8c30fa7f76cab8b9346cd8b9725044d19d75b41416802eaa615fc35ab18d3f216add5f4a2953922f805aad444a92db95ae241542e949b0fb2e7cebeb660820e3479aa825e96b924758a49c696b5425c1e58a22bbe8aa62889ae748e09a2504272725dab5d9e061404b2854f53f80b3c4452b23c07cbda09bd6c151ea45e09d86fa2fd1797054f0bf1eb612bc5d988fb55455251c27434af1eabaaf46148afdb135ac3f4f72b90b9a0976b4159196534ae64322ce00f2408040946369870c26b44e66", 0xd5}, {&(0x7f0000001340)="72f4f73d16887ef581cef9894354ff4ca9288020117faedca46e0f470c4e2fb5b6b0806dd4964df8d80c22429b151413bab5c889b2fe21e3a8f6853bf32ae314dea33343517db5b6e3a2120a2d24563248802de38ad7652bf905e1e2cfb8502720a8c94dac3dda5ea560465206bad298b9d8864b63c9752a90a78a3dec00937e506699d31a575be5c01473fe6c392923fcb51b8ab455931cb3105323c5f29f9a8c9406615d36806f8cbef51c39628b3e97070ad47d9986fd15af2ea1cbad5a50f20676689649b174c04f5828388657f327bf143b4e551023e99a85db720cf7db", 0xe0}, {&(0x7f0000001440)="0714e8ebae1a47d3f1f803db2037846e32827b020a7f84fff922da92a4162aab111c7ab68eb94d54b67522b76aa0d44c34e5b928460ff16c3b7d6ac0c74eb6ef87bd0b6204fa2b8803989af7509e286d882d46c57b7987363ae05de69559468a6fe8bbb623b52b4ddeb0b2296a3c624410bfc9b7b6b7", 0x76}, {&(0x7f00000014c0)="2275dc2a8191fb55fbb453c6429c40f7a5d4ddaeb35aba77b0c41377715e2c9716935b67b420181d832c9e7ee34a051d978b6f5052a1a4f9ebaff3dbb6e987636d6524b7e70dafae29d37c838c00"/90, 0x5a}, {&(0x7f0000001600)="876581c1e418d9aa5d53b60d97a400ee34f25481b0ba95a496f2d05d70c3856e17b9d8b8c16548aa7f0ffe2df5a13d6b095e50f58211b3416ff8cbadddbc8277cf968678ba82be44ca2a1de3565044b1006c6206c0962c3f488387ee930c5b60f20346a117c1d5c446c161999104113fa1a9370420ed02ac613443e70db05b3931e33d42d75bcfc46e795cae5ed9d5da861ed35242c349697ab3680b939c5f33a05b983ebe3884b13cbeb721c2855201b20cd4aa91f83451e34d46d58a945e34c78e0efebdec84", 0xc7}, {&(0x7f0000001700)="ad2aa6151c7da9ca1ba41047756985f8487a9f4ef4857ff7e3d98d138c14d6cec8501ef8740999745fc899c1e843667d80280129c89284a2a3ff168d6ef500308d4e1c45b75712eb2ef7ec75c063e849534a8ce70a9ac24e4aaf6771ce08a3032cfa816c79a0f8cb0e6bd474759bcd45029dc7813644cc6694d0650fcfa85ea85a56ec74c38c4c4d300c75cf31ece695d877334956bb1a96b6137a81e584688109dee1bacb709b415857c4005c5aa0b8ce587474738846b69222b23a35d59d59381f084435c96b", 0xc7}, {&(0x7f0000000140)}], 0x8, 0x11, 0x0, {0x2}}, 0x401) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r4, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2584.531712][T19974] rtnl_newlink+0xb10/0x13b0 [ 2584.536409][T19974] ? __rcu_read_unlock+0x5c/0x290 [ 2584.541451][T19974] ? rtnl_setlink+0x2a0/0x2a0 [ 2584.546137][T19974] rtnetlink_rcv_msg+0x745/0x7e0 [ 2584.551145][T19974] ? ___cache_free+0x46/0x300 [ 2584.555827][T19974] ? kmem_cache_free+0x65/0x110 [ 2584.560716][T19974] ? __kfree_skb+0xfe/0x150 [ 2584.565207][T19974] ? consume_skb+0x48/0x160 [ 2584.569703][T19974] ? nlmon_xmit+0x5f/0x70 [ 2584.574040][T19974] ? __this_cpu_preempt_check+0x18/0x20 [ 2584.579595][T19974] ? __local_bh_enable_ip+0x4d/0x70 [ 2584.584953][T19974] ? local_bh_enable+0x1b/0x20 [ 2584.589715][T19974] ? __dev_queue_xmit+0x597/0xf70 [ 2584.594759][T19974] ? __skb_clone+0x2db/0x300 [ 2584.599355][T19974] ? __rcu_read_unlock+0x5c/0x290 [ 2584.604569][T19974] netlink_rcv_skb+0x14e/0x250 [ 2584.609416][T19974] ? rtnetlink_bind+0x60/0x60 [ 2584.614102][T19974] rtnetlink_rcv+0x18/0x20 [ 2584.618629][T19974] netlink_unicast+0x5fc/0x6c0 [ 2584.623441][T19974] netlink_sendmsg+0x726/0x840 [ 2584.628258][T19974] ? netlink_getsockopt+0x720/0x720 [ 2584.633651][T19974] ____sys_sendmsg+0x39a/0x510 [ 2584.638456][T19974] __sys_sendmsg+0x195/0x230 [ 2584.643128][T19974] __x64_sys_sendmsg+0x42/0x50 [ 2584.647904][T19974] do_syscall_64+0x44/0xd0 [ 2584.652366][T19974] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2584.658279][T19974] RIP: 0033:0x7f3f1b516ae9 [ 2584.662697][T19974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2584.682739][T19974] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2584.691158][T19974] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2584.699227][T19974] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2584.707195][T19974] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2584.715236][T19974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2584.723194][T19974] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2584.731151][T19974] 03:35:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 14) 03:35:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xb00) 03:35:24 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000ef8000/0x3000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r1 = pidfd_open(0xffffffffffffffff, 0x0) lseek(r1, 0x29b, 0x1) 03:35:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0xa00}]}, 0x28}}, 0x0) 03:35:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xdf33000000000000) 03:35:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000007000001", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2584.741549][T19974] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2584.751273][T19974] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xc00) 03:35:24 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000eed000/0x4000)=nil, 0x4000, 0x9, 0x10, r0, 0x8000000) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ef0000/0x4000)=nil, 0x4000, 0x1000009, 0x80010, r0, 0x10000000) r4 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r8 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ef4000/0x4000)=nil, 0x4000, 0x4, 0x110, r4, 0x0) r9 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r12 = io_uring_register$IORING_REGISTER_PERSONALITY(r9, 0x9, 0x0, 0x0) syz_io_uring_submit(r10, r11, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r12}}, 0x10001) syz_io_uring_submit(r8, r3, &(0x7f00000005c0)=@IORING_OP_WRITEV={0x2, 0x1, 0x4007, @fd=r4, 0x1, &(0x7f0000000400)=[{&(0x7f00000004c0)="e6aa9096ecd7a7569b19bf59f8b22744049d7322fb6ecbfb0508066dba5659c15c942abf591e4fea02d09dbfbdde64ac111f931c3b4b1e9e7655c968586de6aa30ff1d1b2bc3bbebedc1b013aea81e41b2ba811488ff0f1de79ac297e0456df964ce3dae9dc59a9ead2565d6c9fb5f1df9717650bc1fad7fda7938df894eb7cb825aaca87cc5cde8f2c0d42bf1bedddaa1043da97a2f30e17fd390e51303a0efa778a3b302a64dfe2796111e227032ce03d8b050800a02bd14e2eb0e64ddbc455c337bf52c3a857823780b", 0xcb}], 0x1, 0x1b, 0x1, {0x2, r12}}, 0xffff) syz_io_uring_submit(r5, r6, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x10001) syz_io_uring_submit(r2, r3, &(0x7f0000000480)=@IORING_OP_SENDMSG={0x9, 0x1, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)="7ce697ab1533667ca5ce680715db8abb0560f12c18c10b9cabf9db74aa3f972603ed4ea9591f0c3b5920a7de6a2cd19363afae272c835a9371b24e52ba7cf94fddebbf733925b13884f19964f5ed8162eeaff937ac3049fbe2342c30836c95dbe3c5bfe4c895112fed76b0413e0e441052942f7d7fd314f603c52e19062acda13c7b333fbaaac22d417781e2ddf336e84c11183324a3fb1c8c623a416afed24d0f998f3a2714eb3945bdc9fa74129064a2a8e2beb28e277d133e75ed0cd46266bcd78625d298387a5fa2e4ce203586233ccf4cf0350a4c0abe290928482cec15", 0xe0}, {&(0x7f00000000c0)="c5fb8ae5b262d793e72f5627cef9d9f81e80d99b18c87fa33360e61b0722ae38df", 0x21}, {&(0x7f0000000100)="a878216d3bad4530f6ade37b671024030fda4d28bff48a9f17075291fea2e7f2f78240d152a8f39652409aa46224da0491a3", 0x32}, {&(0x7f0000000340)="bf25f7412ea40806ec2cdfb4332980a6c72ff08196937ee226735b87d5de2ab86c39234bcda30e3884041018b973881b83f87016c6865e48c5c4a6af4fdd4dd0b7717ef178d8a9f1014efd05e3bceda70116660e2aab946aee46ce7f83bd5fbf0806b002a441e6edad5c16b6ec0e87cd016b5a793aa21f6202ed87ad817b683be051c4c9fbe1", 0x86}], 0x4, &(0x7f0000000400)}, 0x0, 0x0, 0x1, {0x0, r7}}, 0x8001) r13 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r14, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r14, r15, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c70cf4332c14f6e2c2abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f90327d6216e9760fcd648fa65655768fc440a61be189e36e2f665b20a01dd1e2c3be9c9a6964741360a8197159a93627c134fabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4cda923", @ANYRES32, @ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRES64=r14, @ANYBLOB="493c9d23e4857d971ef801d0bdcd796b3fcaac9cc831ae8bcbcc6d4113d00413bc2ab67e298e6053a9cbe2ab654a12449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ec0b74ba8792b4060b8949"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r16 = io_uring_register$IORING_REGISTER_PERSONALITY(r9, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000600)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, r16}}, 0x9) preadv(r13, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0xc00}]}, 0x28}}, 0x0) 03:35:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2584.881211][T20005] FAULT_INJECTION: forcing a failure. [ 2584.881211][T20005] name failslab, interval 1, probability 0, space 0, times 0 [ 2584.894117][T20005] CPU: 0 PID: 20005 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2584.904345][T20005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2584.914395][T20005] Call Trace: [ 2584.917792][T20005] [ 2584.920712][T20005] dump_stack_lvl+0xd6/0x122 03:35:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xd00) [ 2584.921525][T20007] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2584.925320][T20005] dump_stack+0x11/0x1b [ 2584.938901][T20005] should_fail+0x23c/0x250 [ 2584.943316][T20005] __should_failslab+0x81/0x90 [ 2584.948168][T20005] should_failslab+0x5/0x20 [ 2584.952677][T20005] kmem_cache_alloc_node+0x61/0x2d0 [ 2584.957879][T20005] ? __rcu_read_unlock+0x5c/0x290 [ 2584.962913][T20005] ? fib_sync_up+0x51c/0x550 [ 2584.967502][T20005] ? __alloc_skb+0xf0/0x450 [ 2584.972040][T20005] __alloc_skb+0xf0/0x450 [ 2584.976373][T20005] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2584.981677][T20005] rtmsg_ifinfo+0x58/0xc0 [ 2584.986056][T20005] netdev_state_change+0x115/0x170 [ 2584.991179][T20005] do_setlink+0x24a/0x2410 [ 2584.995622][T20005] ? __nla_validate_parse+0x108f/0x1760 [ 2585.001216][T20005] ? __nla_parse+0x3c/0x50 [ 2585.005736][T20005] rtnl_newlink+0xb10/0x13b0 [ 2585.010428][T20005] ? __rcu_read_unlock+0x5c/0x290 [ 2585.015513][T20005] ? rtnl_setlink+0x2a0/0x2a0 [ 2585.020193][T20005] rtnetlink_rcv_msg+0x745/0x7e0 [ 2585.025328][T20005] ? ___cache_free+0x46/0x300 03:35:24 executing program 5: r0 = syz_io_uring_setup(0xf62, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x0, 0x8000000}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000), 0x4) r4 = socket(0x10, 0x80002, 0x0) syz_io_uring_setup(0x2005d3, &(0x7f00000000c0)={0x0, 0xdaea, 0x0, 0x2}, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000eea000/0xc000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f0000001600)=ANY=[@ANYBLOB="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"/386, @ANYBLOB="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"/798, @ANYRES32=r4, @ANYRES16=r3, @ANYRESOCT=r4, @ANYRES32=r6, @ANYRES64=r7, @ANYBLOB="493c9d23e4857dc831aeb67e2928ee53a9cbe2ab654512449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ecf273ba8700010000000000001c57a4fa4e7434856ba7ffd2935180016c279b2e8959aeef1c57ef669648975462d77331097c7679cceccdf1ee6c59bbdf00d8775536c957d32cdf1099e13dde743cece672b61d1525cd2a4afe187a69893dc0499484dd24be905ec018c3b1e213e6fde8201944930d98444521e484520e7ab00fcd987e69470caf39e1fadad986a2dc7cb75066edd769566d47006c618cd1d8652445e228e757305cd008"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r9 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r12 = io_uring_register$IORING_REGISTER_PERSONALITY(r9, 0x9, 0x0, 0x0) syz_io_uring_submit(r10, r11, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r12}}, 0x10001) syz_io_uring_submit(r1, r6, &(0x7f0000000040)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r12}}, 0x4) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0}, 0x10001) syz_io_uring_submit(r7, 0x0, &(0x7f00000004c0)=@IORING_OP_WRITEV={0x2, 0x4, 0x2000, @fd, 0x6, &(0x7f0000000480)=[{&(0x7f0000003000)="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", 0x1000}, {&(0x7f00000001c0)="a81911004bff0d3288d9a94dcb471c90b4d8e9c48d7cf2278defd8399cf24a77ebbfe252b981be4c19a993b66046ac48a4ec0e6c7813e559cb4a06692ed186d6814dd11c98760aa07b441613dab5b6a0701a829f5826133798598c1b5b2d98f375e85ec508816d87088f7971e63254c12d618e543dd5d1e38a5f9f18fa17556173ab5aeddc03689b37df0cbc7997e2cce45fce2d265bbf45f320c72c949a1180133a4bf196d93d1ff087c8c2a303e93dfec0a34d1cea4738603793bf936b877a5445bafd74c72bca1d6039f99d5ebb4170b9e8485c3e1c86f77bb2a6bde96845bc041ba0454b005236fbe2f164623159febd7d6117a2198062", 0xf9}, {&(0x7f00000003c0)="d356c55caa3ca4d8361d9f6c0711f82b24d643c878571f4912694335ffd9e72b5b5987e39ddf05dac875a8e5c83b59338c158cddda431608e56f9e6326d9a638fe55b7d63080b27d40ab336a74bf2024a9f68490c3768b7bb724b233b4aaf1dfe3c16ca3186da8d53b2a53cff16047b9a8445f0e91c8856d385b2cc5832eec776f91581279dcd934ff495f048acd75e3c92fd47a0ddaae500a072f65a4a8a57dabcd76", 0xa3}, {&(0x7f0000000340)="f8ecbbe7839db755d6225014c415cfe2c07adb5a04ee997febc2d3", 0x1b}], 0x4, 0x12, 0x0, {0x1}}, 0x71ac) [ 2585.030015][T20005] ? kmem_cache_free+0x65/0x110 [ 2585.034879][T20005] ? __kfree_skb+0xfe/0x150 [ 2585.039482][T20005] ? consume_skb+0x48/0x160 [ 2585.043993][T20005] ? nlmon_xmit+0x5f/0x70 [ 2585.048439][T20005] ? __this_cpu_preempt_check+0x18/0x20 [ 2585.054021][T20005] ? __local_bh_enable_ip+0x4d/0x70 [ 2585.059228][T20005] ? local_bh_enable+0x1b/0x20 [ 2585.064096][T20005] ? __dev_queue_xmit+0x597/0xf70 [ 2585.069162][T20005] ? __skb_clone+0x2db/0x300 [ 2585.073786][T20005] ? __rcu_read_unlock+0x5c/0x290 [ 2585.078820][T20005] netlink_rcv_skb+0x14e/0x250 [ 2585.083612][T20005] ? rtnetlink_bind+0x60/0x60 [ 2585.088415][T20005] rtnetlink_rcv+0x18/0x20 [ 2585.092876][T20005] netlink_unicast+0x5fc/0x6c0 [ 2585.097651][T20005] netlink_sendmsg+0x726/0x840 [ 2585.102578][T20005] ? netlink_getsockopt+0x720/0x720 [ 2585.107816][T20005] ____sys_sendmsg+0x39a/0x510 [ 2585.112589][T20005] __sys_sendmsg+0x195/0x230 [ 2585.117193][T20005] __x64_sys_sendmsg+0x42/0x50 [ 2585.122099][T20005] do_syscall_64+0x44/0xd0 [ 2585.126505][T20005] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2585.132635][T20005] RIP: 0033:0x7f3f1b516ae9 [ 2585.137051][T20005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2585.156950][T20005] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2585.165389][T20005] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2585.173514][T20005] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2585.181467][T20005] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2585.189444][T20005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2585.197409][T20005] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2585.205359][T20005] [ 2585.214657][T20005] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 15) 03:35:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xe00) 03:35:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x7, 0x1, 0x9, 0x9, 0x0, 0x4, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x1, 0x9}, 0x1003, 0x0, 0x8, 0x40ebd621e501532a, 0x8, 0x4, 0xfff8, 0x0, 0x7, 0x0, 0x9}, 0x0, 0xd, 0xffffffffffffffff, 0x2b9cdf26c73bc132) r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x9549, 0x0, 0x2}, &(0x7f0000ef4000/0x2000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000eed000/0x4000)=nil, 0x4000, 0x200000d, 0x110, r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x6, &(0x7f0000000280)=0x3, 0x4) getsockopt$inet6_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000080)) syz_io_uring_submit(r1, 0x0, &(0x7f00000000c0)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xabf) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000140), 0x1) r3 = syz_open_dev$vcsa(&(0x7f00000001c0), 0x67ed, 0xc081) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000240), 0x1) getsockopt$inet6_tcp_int(r4, 0x6, 0x9, 0x0, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000001400)=ANY=[@ANYBLOB="1800"/12, @ANYRES32=r4, @ANYBLOB="00000000000000002e2f666b6c6530003f19da1cd30e2044ce0ad942f5f79d9695d6e3d4836584cc563833a0f0efce2f53de"]) syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r5 = signalfd4(r4, &(0x7f0000000100)={[0x5]}, 0x8, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r5, 0x0, 0x486, &(0x7f0000001380), &(0x7f00000013c0)=0xc) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000001480)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000001000000002e2f66696c653000d04dce7b4ba9fa91de4484d48e157782263d06b702bf90b986375a7e3896858b1d5cede09a959657fc3c97d5658c8b621daffc263a393c40f7a16b5fedaf48804e8b2d5e40ad6af6a13eca20fade7bdf0c25ae3bdc1742329eac6986d842dbe0feec4cbc7ed7e70c34a1a81b3ec756f32c2a48367999d79e06ec1b938bae336ebbe775f3bdb69950a1870e8970fc2f5cd531792202d6e38ea0b12a079edd9eca621d67ff9021f1b019bfe3321274fb259a915326b2e41d10de278109d928eda0206ead21ba2d630a64"]) preadv(r6, &(0x7f0000001340)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0xf00}]}, 0x28}}, 0x0) 03:35:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xeaffffff00000000) 03:35:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x1100) 03:35:25 executing program 5: syz_io_uring_setup(0x7b8d, &(0x7f0000000040)={0x0, 0x573f, 0x10, 0x3, 0x6e}, &(0x7f0000ef9000/0x2000)=nil, &(0x7f0000eec000/0x4000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r1 = syz_io_uring_setup(0x495a, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000008540)=@IORING_OP_WRITE={0x17, 0x0, 0x2000, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x10001) syz_io_uring_submit(r0, 0x0, &(0x7f0000000140)=@IORING_OP_WRITE={0x17, 0x5, 0x4004, @fd_index=0x1, 0xfffffffffffffff8, &(0x7f00000001c0)="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", 0xfd, 0x10, 0x0, {0x0, r4}}, 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r5, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2585.224613][T20005] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2585.252454][T20022] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x10f7}]}, 0x28}}, 0x0) [ 2585.366745][T20034] FAULT_INJECTION: forcing a failure. [ 2585.366745][T20034] name failslab, interval 1, probability 0, space 0, times 0 [ 2585.379432][T20034] CPU: 0 PID: 20034 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2585.389628][T20034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2585.399739][T20034] Call Trace: [ 2585.403053][T20034] [ 2585.406427][T20034] dump_stack_lvl+0xd6/0x122 [ 2585.411102][T20034] dump_stack+0x11/0x1b [ 2585.415263][T20034] should_fail+0x23c/0x250 [ 2585.418674][T20039] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2585.419682][T20034] __should_failslab+0x81/0x90 [ 2585.419711][T20034] should_failslab+0x5/0x20 [ 2585.438407][T20034] kmem_cache_alloc_node_trace+0x61/0x310 [ 2585.444244][T20034] ? __kmalloc_node_track_caller+0x30/0x40 [ 2585.450083][T20034] __kmalloc_node_track_caller+0x30/0x40 [ 2585.455784][T20034] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2585.461471][T20034] __alloc_skb+0x19d/0x450 03:35:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x1200) 03:35:25 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000340)={0x0, 0x1, @start={0x0, 0x1, "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", "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"}, [0x1, 0x1, 0xcd81, 0x3, 0x3, 0x0, 0x80, 0x1ff, 0x100, 0x7, 0x80000001, 0x7, 0xf17, 0x1ff, 0x84d, 0x7, 0x2, 0xb93, 0x0, 0x3f, 0x1, 0xf3, 0x6, 0x8, 0xc99, 0x6f4c2470, 0x825, 0x80000001, 0x8, 0x8000, 0x1, 0x9, 0xfff, 0x2, 0x1, 0x9, 0x3, 0xbc2, 0xcd, 0x800, 0xfffffffffffffff9, 0x9, 0x4, 0x3, 0x6, 0xffffffffffffffff, 0x2, 0x0, 0x8001, 0x1000, 0x0, 0x3, 0x6, 0x6a0c, 0x3, 0x10001, 0xc6, 0xffff, 0x1ff, 0x656, 0x8f, 0x400, 0x7, 0x1]}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000d80)={0x0, 0x101, 0x10000}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000001180)={0x4, 0x2, {0x4, @usage=0x9, 0x0, 0x2, 0x20, 0x6, 0x6, 0x4, 0x84, @usage=0x7, 0x5, 0x1000, [0xd7b7, 0x1, 0x400, 0x5, 0x8001, 0x5]}, {0xffffffffffffffdf, @struct={0x6, 0x20}, r3, 0x8, 0x0, 0x3f, 0xa809, 0xbe, 0x0, @struct={0x1, 0x4}, 0x2, 0x9, [0x5, 0x6, 0x7, 0xb6, 0x9, 0x4]}, {0x8, @struct={0x2, 0x8}, r4, 0x17b, 0x1000, 0x8, 0x781ad595, 0x3, 0x8d, @struct={0x6, 0x81}, 0x7fffffff, 0x37, [0xca5, 0x1, 0x80, 0x3, 0x3, 0x10001]}, {0x0, 0x7, 0x5}}) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x3, 0x0, 0x0, 0x8, &(0x7f0000000040), 0x1, 0x1, 0x1}, 0x83) [ 2585.465894][T20034] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2585.471214][T20034] rtmsg_ifinfo+0x58/0xc0 [ 2585.475597][T20034] netdev_state_change+0x115/0x170 [ 2585.480715][T20034] do_setlink+0x24a/0x2410 [ 2585.485127][T20034] ? __nla_validate_parse+0x108f/0x1760 [ 2585.490830][T20034] ? __nla_parse+0x3c/0x50 [ 2585.495330][T20034] rtnl_newlink+0xb10/0x13b0 [ 2585.499939][T20034] ? __rcu_read_unlock+0x5c/0x290 [ 2585.504987][T20034] ? rtnl_setlink+0x2a0/0x2a0 [ 2585.509726][T20034] rtnetlink_rcv_msg+0x745/0x7e0 03:35:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x2000) [ 2585.514649][T20034] ? ___cache_free+0x46/0x300 [ 2585.519514][T20034] ? kmem_cache_free+0x65/0x110 [ 2585.524408][T20034] ? __kfree_skb+0xfe/0x150 [ 2585.529063][T20034] ? consume_skb+0x48/0x160 [ 2585.533658][T20034] ? nlmon_xmit+0x5f/0x70 [ 2585.538002][T20034] ? __this_cpu_preempt_check+0x18/0x20 [ 2585.543611][T20034] ? __local_bh_enable_ip+0x4d/0x70 [ 2585.548891][T20034] ? local_bh_enable+0x1b/0x20 [ 2585.553654][T20034] ? __dev_queue_xmit+0x597/0xf70 [ 2585.558690][T20034] ? __skb_clone+0x2db/0x300 [ 2585.563409][T20034] ? __rcu_read_unlock+0x5c/0x290 [ 2585.568494][T20034] netlink_rcv_skb+0x14e/0x250 [ 2585.573297][T20034] ? rtnetlink_bind+0x60/0x60 [ 2585.578030][T20034] rtnetlink_rcv+0x18/0x20 [ 2585.582452][T20034] netlink_unicast+0x5fc/0x6c0 [ 2585.587244][T20034] netlink_sendmsg+0x726/0x840 [ 2585.592014][T20034] ? netlink_getsockopt+0x720/0x720 [ 2585.597279][T20034] ____sys_sendmsg+0x39a/0x510 [ 2585.602049][T20034] __sys_sendmsg+0x195/0x230 [ 2585.606736][T20034] __x64_sys_sendmsg+0x42/0x50 [ 2585.611620][T20034] do_syscall_64+0x44/0xd0 [ 2585.616034][T20034] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2585.622035][T20034] RIP: 0033:0x7f3f1b516ae9 [ 2585.626439][T20034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2585.646083][T20034] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2585.655101][T20034] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2585.663067][T20034] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2585.671044][T20034] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2585.679013][T20034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2585.687055][T20034] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2585.695101][T20034] [ 2585.705082][T20034] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 16) 03:35:25 executing program 5: syz_io_uring_setup(0x1337, &(0x7f00000002c0)={0x0, 0xfca9, 0x8, 0x4}, &(0x7f0000ef6000/0x4000)=nil, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r1 = memfd_create(&(0x7f0000000080)='\x00', 0x5) open(&(0x7f0000000040)='./file0\x00', 0x20100, 0x8) preadv(r1, &(0x7f00000000c0)=[{&(0x7f0000002000)=""/4087, 0xff7}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2, 0x0, 0x0) pidfd_getfd(r0, r1, 0x0) 03:35:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x2500) 03:35:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x2100}]}, 0x28}}, 0x0) 03:35:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xefffffff00000000) 03:35:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x4000) 03:35:25 executing program 5: syz_io_uring_setup(0x3395, &(0x7f00000002c0)={0x0, 0x40000000}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2585.715150][T20034] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x4788}]}, 0x28}}, 0x0) 03:35:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000007000001080000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2585.858938][T20070] FAULT_INJECTION: forcing a failure. [ 2585.858938][T20070] name failslab, interval 1, probability 0, space 0, times 0 [ 2585.871717][T20070] CPU: 1 PID: 20070 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2585.881858][T20070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2585.893184][T20070] Call Trace: [ 2585.896519][T20070] [ 2585.899477][T20070] dump_stack_lvl+0xd6/0x122 [ 2585.904059][T20070] dump_stack+0x11/0x1b [ 2585.908205][T20070] should_fail+0x23c/0x250 [ 2585.912632][T20070] __should_failslab+0x81/0x90 [ 2585.917552][T20070] should_failslab+0x5/0x20 [ 2585.922046][T20070] kmem_cache_alloc_node_trace+0x61/0x310 [ 2585.927818][T20070] ? __kmalloc_node_track_caller+0x30/0x40 [ 2585.933640][T20070] __kmalloc_node_track_caller+0x30/0x40 [ 2585.939324][T20070] ? netlink_trim+0x112/0x140 [ 2585.944115][T20070] pskb_expand_head+0xca/0x8b0 [ 2585.948926][T20070] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2585.954141][T20070] netlink_trim+0x112/0x140 [ 2585.958714][T20070] netlink_broadcast+0x42/0xad0 [ 2585.963639][T20070] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2585.969169][T20070] nlmsg_notify+0xc7/0x170 [ 2585.973770][T20070] rtmsg_ifinfo+0xa4/0xc0 [ 2585.978077][T20070] netdev_state_change+0x115/0x170 [ 2585.983328][T20070] do_setlink+0x24a/0x2410 [ 2585.987749][T20070] ? __nla_validate_parse+0x108f/0x1760 [ 2585.993289][T20070] ? __nla_parse+0x3c/0x50 [ 2585.997760][T20070] rtnl_newlink+0xb10/0x13b0 [ 2586.002346][T20070] ? __rcu_read_unlock+0x5c/0x290 [ 2586.007349][T20070] ? rtnl_setlink+0x2a0/0x2a0 [ 2586.012005][T20070] rtnetlink_rcv_msg+0x745/0x7e0 [ 2586.016923][T20070] ? ___cache_free+0x46/0x300 [ 2586.021677][T20070] ? kmem_cache_free+0x65/0x110 [ 2586.026511][T20070] ? __kfree_skb+0xfe/0x150 [ 2586.031084][T20070] ? consume_skb+0x48/0x160 [ 2586.035636][T20070] ? nlmon_xmit+0x5f/0x70 [ 2586.039944][T20070] ? __this_cpu_preempt_check+0x18/0x20 [ 2586.045620][T20070] ? __local_bh_enable_ip+0x4d/0x70 [ 2586.050813][T20070] ? local_bh_enable+0x1b/0x20 [ 2586.055569][T20070] ? __dev_queue_xmit+0x597/0xf70 [ 2586.060579][T20070] ? __skb_clone+0x2db/0x300 [ 2586.065163][T20070] ? __rcu_read_unlock+0x5c/0x290 [ 2586.070264][T20070] netlink_rcv_skb+0x14e/0x250 [ 2586.075086][T20070] ? rtnetlink_bind+0x60/0x60 [ 2586.079748][T20070] rtnetlink_rcv+0x18/0x20 [ 2586.084267][T20070] netlink_unicast+0x5fc/0x6c0 [ 2586.089097][T20070] netlink_sendmsg+0x726/0x840 [ 2586.093901][T20070] ? netlink_getsockopt+0x720/0x720 [ 2586.099125][T20070] ____sys_sendmsg+0x39a/0x510 [ 2586.103878][T20070] __sys_sendmsg+0x195/0x230 [ 2586.108463][T20070] __x64_sys_sendmsg+0x42/0x50 [ 2586.113270][T20070] do_syscall_64+0x44/0xd0 [ 2586.117787][T20070] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2586.124006][T20070] RIP: 0033:0x7f3f1b516ae9 [ 2586.128400][T20070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2586.148039][T20070] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2586.156428][T20070] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2586.164384][T20070] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2586.172413][T20070] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2586.180368][T20070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2586.188386][T20070] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2586.196422][T20070] 03:35:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 17) 03:35:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xf0ffffff00000000) 03:35:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x4800) [ 2586.205491][T20070] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2586.215268][T20070] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x4888}]}, 0x28}}, 0x0) 03:35:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000007000001080000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2586.486164][T20083] FAULT_INJECTION: forcing a failure. [ 2586.486164][T20083] name failslab, interval 1, probability 0, space 0, times 0 [ 2586.498842][T20083] CPU: 0 PID: 20083 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2586.509006][T20083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2586.519120][T20083] Call Trace: [ 2586.522449][T20083] [ 2586.525380][T20083] dump_stack_lvl+0xd6/0x122 [ 2586.529981][T20083] dump_stack+0x11/0x1b [ 2586.534231][T20083] should_fail+0x23c/0x250 [ 2586.538753][T20083] __should_failslab+0x81/0x90 [ 2586.543524][T20083] should_failslab+0x5/0x20 [ 2586.548055][T20083] kmem_cache_alloc_node+0x61/0x2d0 [ 2586.553285][T20083] ? __rcu_read_unlock+0x5c/0x290 [ 2586.558311][T20083] ? __alloc_skb+0xf0/0x450 [ 2586.562901][T20083] __alloc_skb+0xf0/0x450 [ 2586.567560][T20083] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2586.572874][T20083] rtmsg_ifinfo+0x58/0xc0 [ 2586.577380][T20083] netdev_state_change+0x115/0x170 [ 2586.582498][T20083] do_setlink+0x24a/0x2410 [ 2586.586927][T20083] ? __nla_validate_parse+0x108f/0x1760 [ 2586.592554][T20083] ? __nla_parse+0x3c/0x50 [ 2586.596973][T20083] rtnl_newlink+0xb10/0x13b0 [ 2586.601726][T20083] ? __rcu_read_unlock+0x5c/0x290 [ 2586.606829][T20083] ? rtnl_setlink+0x2a0/0x2a0 [ 2586.611570][T20083] rtnetlink_rcv_msg+0x745/0x7e0 [ 2586.616516][T20083] ? ___cache_free+0x46/0x300 [ 2586.621258][T20083] ? kmem_cache_free+0x65/0x110 [ 2586.626108][T20083] ? __kfree_skb+0xfe/0x150 [ 2586.630669][T20083] ? consume_skb+0x48/0x160 [ 2586.635241][T20083] ? nlmon_xmit+0x5f/0x70 [ 2586.639576][T20083] ? __this_cpu_preempt_check+0x18/0x20 [ 2586.645198][T20083] ? __local_bh_enable_ip+0x4d/0x70 [ 2586.650399][T20083] ? local_bh_enable+0x1b/0x20 [ 2586.655174][T20083] ? __dev_queue_xmit+0x597/0xf70 [ 2586.660201][T20083] ? __skb_clone+0x2db/0x300 [ 2586.664922][T20083] ? __rcu_read_unlock+0x5c/0x290 [ 2586.670005][T20083] netlink_rcv_skb+0x14e/0x250 [ 2586.674789][T20083] ? rtnetlink_bind+0x60/0x60 [ 2586.679472][T20083] rtnetlink_rcv+0x18/0x20 [ 2586.683952][T20083] netlink_unicast+0x5fc/0x6c0 [ 2586.688778][T20083] netlink_sendmsg+0x726/0x840 [ 2586.693550][T20083] ? netlink_getsockopt+0x720/0x720 [ 2586.699016][T20083] ____sys_sendmsg+0x39a/0x510 [ 2586.703883][T20083] __sys_sendmsg+0x195/0x230 [ 2586.708584][T20083] __x64_sys_sendmsg+0x42/0x50 [ 2586.713379][T20083] do_syscall_64+0x44/0xd0 [ 2586.717822][T20083] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2586.723721][T20083] RIP: 0033:0x7f3f1b516ae9 [ 2586.728137][T20083] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2586.748064][T20083] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2586.756510][T20083] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2586.764581][T20083] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2586.772822][T20083] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 03:35:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xfeffffff00000000) 03:35:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x4c00) [ 2586.780791][T20083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2586.788777][T20083] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2586.796778][T20083] [ 2586.808189][T20083] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2586.821807][T20083] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 18) 03:35:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x5865}]}, 0x28}}, 0x0) 03:35:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000007000001080000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x6800) 03:35:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xffffff7f00000000) [ 2586.979244][T20098] FAULT_INJECTION: forcing a failure. [ 2586.979244][T20098] name failslab, interval 1, probability 0, space 0, times 0 [ 2586.992335][T20098] CPU: 0 PID: 20098 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2587.002661][T20098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2587.012725][T20098] Call Trace: [ 2587.016002][T20098] [ 2587.018929][T20098] dump_stack_lvl+0xd6/0x122 [ 2587.023522][T20098] dump_stack+0x11/0x1b 03:35:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x6c00) [ 2587.027755][T20098] should_fail+0x23c/0x250 [ 2587.032171][T20098] __should_failslab+0x81/0x90 [ 2587.036938][T20098] should_failslab+0x5/0x20 [ 2587.041446][T20098] kmem_cache_alloc_node_trace+0x61/0x310 [ 2587.047170][T20098] ? __kmalloc_node_track_caller+0x30/0x40 [ 2587.052983][T20098] __kmalloc_node_track_caller+0x30/0x40 [ 2587.058643][T20098] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2587.064111][T20098] __alloc_skb+0x19d/0x450 [ 2587.068532][T20098] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2587.073895][T20098] rtmsg_ifinfo+0x58/0xc0 03:35:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x7400) [ 2587.078222][T20098] netdev_state_change+0x115/0x170 [ 2587.083402][T20098] do_setlink+0x24a/0x2410 [ 2587.087819][T20098] ? __nla_validate_parse+0x108f/0x1760 [ 2587.093384][T20098] ? __nla_parse+0x3c/0x50 [ 2587.097797][T20098] rtnl_newlink+0xb10/0x13b0 [ 2587.102441][T20098] ? __rcu_read_unlock+0x5c/0x290 [ 2587.107491][T20098] ? rtnl_setlink+0x2a0/0x2a0 [ 2587.112194][T20098] rtnetlink_rcv_msg+0x745/0x7e0 [ 2587.117189][T20098] ? ___cache_free+0x46/0x300 [ 2587.121894][T20098] ? kmem_cache_free+0x65/0x110 03:35:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x7a00) [ 2587.126748][T20098] ? __kfree_skb+0xfe/0x150 [ 2587.131290][T20098] ? consume_skb+0x48/0x160 [ 2587.135932][T20098] ? nlmon_xmit+0x5f/0x70 [ 2587.140340][T20098] ? __this_cpu_preempt_check+0x18/0x20 [ 2587.145885][T20098] ? __local_bh_enable_ip+0x4d/0x70 [ 2587.151103][T20098] ? local_bh_enable+0x1b/0x20 [ 2587.155864][T20098] ? __dev_queue_xmit+0x597/0xf70 [ 2587.160948][T20098] ? __skb_clone+0x2db/0x300 [ 2587.165541][T20098] ? __rcu_read_unlock+0x5c/0x290 [ 2587.170645][T20098] netlink_rcv_skb+0x14e/0x250 [ 2587.175459][T20098] ? rtnetlink_bind+0x60/0x60 03:35:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x200000) [ 2587.180218][T20098] rtnetlink_rcv+0x18/0x20 [ 2587.184637][T20098] netlink_unicast+0x5fc/0x6c0 [ 2587.189481][T20098] netlink_sendmsg+0x726/0x840 [ 2587.194298][T20098] ? netlink_getsockopt+0x720/0x720 [ 2587.199501][T20098] ____sys_sendmsg+0x39a/0x510 [ 2587.204336][T20098] __sys_sendmsg+0x195/0x230 [ 2587.208989][T20098] __x64_sys_sendmsg+0x42/0x50 [ 2587.213831][T20098] do_syscall_64+0x44/0xd0 [ 2587.218248][T20098] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2587.224145][T20098] RIP: 0033:0x7f3f1b516ae9 [ 2587.228646][T20098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2587.248261][T20098] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2587.256700][T20098] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2587.264668][T20098] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2587.272740][T20098] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 03:35:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x6000}]}, 0x28}}, 0x0) 03:35:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xe0ff7f) [ 2587.280711][T20098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2587.288784][T20098] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2587.296833][T20098] 03:35:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xf0ff1f) 03:35:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 19) 03:35:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x1000000) 03:35:27 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x1, "2156816c73038c"}) r5 = syz_open_dev$sg(&(0x7f0000000040), 0x20000000000000, 0x105000) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000052a00)={0x3ff, [{}, {}, {}, {}, {}, {0x0, 0x0}], 0x7f, "347b6ac08ae04d"}) r10 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r10, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x1, "2156816c73038c"}) r14 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r14, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r14, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r16, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r17}], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000053a00)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {0x0, r8}, {0x0, r9}, {r12}, {0x0, r17}], 0x6, "67834e52a95735"}) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}}, 0x4008080) 03:35:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x6558}]}, 0x28}}, 0x0) 03:35:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xffffffff00000000) [ 2587.499917][T20098] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2587.510321][T20098] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x2000000) 03:35:27 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000)=0x0, 0x0) syz_io_uring_setup(0x4ea9, &(0x7f0000000040)={0x0, 0x7942, 0x4, 0x1, 0x2a1, 0x0, r0}, &(0x7f0000ef0000/0x1000)=nil, &(0x7f0000ef1000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) r3 = socket$rds(0x15, 0x5, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_SEND={0x1a, 0x5, 0x0, r3, 0x0, &(0x7f0000000140)="1efc13c14f1393e8", 0x8, 0x40004}, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r4, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8, 0x80010, r4, 0x10000000) syz_io_uring_submit(0x0, r5, &(0x7f0000000280)=@IORING_OP_READ=@pass_buffer={0x16, 0x1, 0x6000, @fd_index=0x5, 0x2, &(0x7f0000000200)=""/66, 0x42, 0x1, 0x1}, 0x2) 03:35:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}}, 0x4008080) 03:35:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x8100}]}, 0x28}}, 0x0) [ 2587.686608][T20134] __nla_validate_parse: 8 callbacks suppressed [ 2587.686694][T20134] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2587.686802][T20135] FAULT_INJECTION: forcing a failure. [ 2587.686802][T20135] name failslab, interval 1, probability 0, space 0, times 0 [ 2587.714994][T20135] CPU: 1 PID: 20135 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2587.725148][T20135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2587.735179][T20135] Call Trace: [ 2587.738442][T20135] [ 2587.741355][T20135] dump_stack_lvl+0xd6/0x122 [ 2587.745977][T20135] dump_stack+0x11/0x1b [ 2587.750172][T20135] should_fail+0x23c/0x250 [ 2587.754636][T20135] __should_failslab+0x81/0x90 [ 2587.759543][T20135] should_failslab+0x5/0x20 [ 2587.764328][T20135] kmem_cache_alloc_node_trace+0x61/0x310 [ 2587.770098][T20135] ? __kmalloc_node_track_caller+0x30/0x40 [ 2587.775900][T20135] __kmalloc_node_track_caller+0x30/0x40 [ 2587.781522][T20135] ? netlink_trim+0x112/0x140 [ 2587.786445][T20135] pskb_expand_head+0xca/0x8b0 [ 2587.791279][T20135] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2587.796474][T20135] netlink_trim+0x112/0x140 [ 2587.800964][T20135] netlink_broadcast+0x42/0xad0 [ 2587.805797][T20135] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2587.811237][T20135] nlmsg_notify+0xc7/0x170 [ 2587.815637][T20135] rtmsg_ifinfo+0xa4/0xc0 [ 2587.820042][T20135] netdev_state_change+0x115/0x170 [ 2587.825153][T20135] do_setlink+0x24a/0x2410 [ 2587.829567][T20135] ? __nla_validate_parse+0x108f/0x1760 [ 2587.835191][T20135] ? __nla_parse+0x3c/0x50 [ 2587.839675][T20135] rtnl_newlink+0xb10/0x13b0 [ 2587.844309][T20135] ? __rcu_read_unlock+0x5c/0x290 [ 2587.849369][T20135] ? rtnl_setlink+0x2a0/0x2a0 [ 2587.854031][T20135] rtnetlink_rcv_msg+0x745/0x7e0 [ 2587.858987][T20135] ? ___cache_free+0x46/0x300 [ 2587.863725][T20135] ? kmem_cache_free+0x65/0x110 [ 2587.868594][T20135] ? __kfree_skb+0xfe/0x150 [ 2587.873080][T20135] ? consume_skb+0x48/0x160 [ 2587.877588][T20135] ? nlmon_xmit+0x5f/0x70 [ 2587.881902][T20135] ? __this_cpu_preempt_check+0x18/0x20 [ 2587.887553][T20135] ? __local_bh_enable_ip+0x4d/0x70 [ 2587.892733][T20135] ? local_bh_enable+0x1b/0x20 [ 2587.897608][T20135] ? __dev_queue_xmit+0x597/0xf70 [ 2587.902644][T20135] ? __skb_clone+0x2db/0x300 [ 2587.907269][T20135] ? __rcu_read_unlock+0x5c/0x290 [ 2587.912274][T20135] netlink_rcv_skb+0x14e/0x250 [ 2587.917045][T20135] ? rtnetlink_bind+0x60/0x60 [ 2587.921797][T20135] rtnetlink_rcv+0x18/0x20 [ 2587.926192][T20135] netlink_unicast+0x5fc/0x6c0 [ 2587.930937][T20135] netlink_sendmsg+0x726/0x840 [ 2587.935693][T20135] ? netlink_getsockopt+0x720/0x720 [ 2587.940954][T20135] ____sys_sendmsg+0x39a/0x510 [ 2587.945733][T20135] __sys_sendmsg+0x195/0x230 [ 2587.950397][T20135] __x64_sys_sendmsg+0x42/0x50 [ 2587.955142][T20135] do_syscall_64+0x44/0xd0 [ 2587.959623][T20135] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2587.965524][T20135] RIP: 0033:0x7f3f1b516ae9 [ 2587.969932][T20135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2587.989550][T20135] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2587.997942][T20135] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2588.005957][T20135] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2588.014017][T20135] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2588.021971][T20135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2588.029948][T20135] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 03:35:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 20) 03:35:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @empty}], 0x10) listen(r0, 0x1f) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f00003cef9f)='H', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) dup3(r1, r0, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0xd, &(0x7f0000000000), 0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe71}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73782e8e544023bd25233c1e7a"], &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r2, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000080)=ANY=[@ANYBLOB="200004000206010309000000226a97000000000c0000010900020073797a3100000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) [ 2588.037897][T20135] [ 2588.046877][T20135] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2588.056728][T20135] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2588.076688][T20138] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x3000000) 03:35:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}}, 0x4008080) 03:35:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x8847}]}, 0x28}}, 0x0) [ 2588.326653][T20152] FAULT_INJECTION: forcing a failure. [ 2588.326653][T20152] name failslab, interval 1, probability 0, space 0, times 0 [ 2588.339334][T20152] CPU: 0 PID: 20152 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2588.349495][T20152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2588.359548][T20152] Call Trace: [ 2588.362822][T20152] [ 2588.365766][T20152] dump_stack_lvl+0xd6/0x122 [ 2588.370414][T20152] dump_stack+0x11/0x1b [ 2588.374570][T20152] should_fail+0x23c/0x250 [ 2588.379069][T20152] __should_failslab+0x81/0x90 [ 2588.383840][T20152] should_failslab+0x5/0x20 [ 2588.388373][T20152] kmem_cache_alloc_node+0x61/0x2d0 [ 2588.393579][T20152] ? __rcu_read_unlock+0x5c/0x290 [ 2588.398611][T20152] ? fib_sync_up+0x51c/0x550 [ 2588.403204][T20152] ? __alloc_skb+0xf0/0x450 [ 2588.407712][T20152] __alloc_skb+0xf0/0x450 [ 2588.412110][T20152] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2588.417476][T20152] rtmsg_ifinfo+0x58/0xc0 [ 2588.421921][T20152] netdev_state_change+0x115/0x170 [ 2588.427040][T20152] do_setlink+0x24a/0x2410 [ 2588.431463][T20152] ? __nla_validate_parse+0x108f/0x1760 [ 2588.437082][T20152] ? __nla_parse+0x3c/0x50 [ 2588.441576][T20152] rtnl_newlink+0xb10/0x13b0 [ 2588.446290][T20152] ? __rcu_read_unlock+0x5c/0x290 [ 2588.451383][T20152] ? rtnl_setlink+0x2a0/0x2a0 [ 2588.456066][T20152] rtnetlink_rcv_msg+0x745/0x7e0 [ 2588.461031][T20152] ? ___cache_free+0x46/0x300 [ 2588.465728][T20152] ? kmem_cache_free+0x65/0x110 [ 2588.470580][T20152] ? __kfree_skb+0xfe/0x150 03:35:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x4000000) [ 2588.475132][T20152] ? consume_skb+0x48/0x160 [ 2588.479689][T20152] ? nlmon_xmit+0x5f/0x70 [ 2588.484021][T20152] ? __this_cpu_preempt_check+0x18/0x20 [ 2588.489648][T20152] ? __local_bh_enable_ip+0x4d/0x70 [ 2588.494894][T20152] ? local_bh_enable+0x1b/0x20 [ 2588.499844][T20152] ? __dev_queue_xmit+0x597/0xf70 [ 2588.504869][T20152] ? __skb_clone+0x2db/0x300 [ 2588.509505][T20152] ? __rcu_read_unlock+0x5c/0x290 [ 2588.514527][T20152] netlink_rcv_skb+0x14e/0x250 [ 2588.519371][T20152] ? rtnetlink_bind+0x60/0x60 [ 2588.524121][T20152] rtnetlink_rcv+0x18/0x20 [ 2588.528541][T20152] netlink_unicast+0x5fc/0x6c0 [ 2588.533351][T20152] netlink_sendmsg+0x726/0x840 [ 2588.538237][T20152] ? netlink_getsockopt+0x720/0x720 [ 2588.543457][T20152] ____sys_sendmsg+0x39a/0x510 [ 2588.548235][T20152] __sys_sendmsg+0x195/0x230 [ 2588.552904][T20152] __x64_sys_sendmsg+0x42/0x50 [ 2588.557675][T20152] do_syscall_64+0x44/0xd0 [ 2588.562103][T20152] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2588.568028][T20152] RIP: 0033:0x7f3f1b516ae9 [ 2588.572484][T20152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2588.592180][T20152] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2588.600744][T20152] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2588.608712][T20152] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2588.616694][T20152] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 03:35:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x8848}]}, 0x28}}, 0x0) [ 2588.624671][T20152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2588.632646][T20152] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2588.640618][T20152] [ 2588.652638][T20152] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x0) 03:35:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 21) 03:35:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x5000000) [ 2588.663380][T20152] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0xc305}]}, 0x28}}, 0x0) 03:35:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x0) 03:35:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x6000000) [ 2588.803742][T20173] FAULT_INJECTION: forcing a failure. [ 2588.803742][T20173] name failslab, interval 1, probability 0, space 0, times 0 [ 2588.816372][T20173] CPU: 0 PID: 20173 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2588.826522][T20173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2588.836840][T20173] Call Trace: [ 2588.840116][T20173] [ 2588.843094][T20173] dump_stack_lvl+0xd6/0x122 [ 2588.847702][T20173] dump_stack+0x11/0x1b [ 2588.851858][T20173] should_fail+0x23c/0x250 [ 2588.856302][T20173] __should_failslab+0x81/0x90 [ 2588.861077][T20173] should_failslab+0x5/0x20 [ 2588.865583][T20173] kmem_cache_alloc_node_trace+0x61/0x310 [ 2588.871310][T20173] ? __kmalloc_node_track_caller+0x30/0x40 [ 2588.877196][T20173] __kmalloc_node_track_caller+0x30/0x40 [ 2588.882836][T20173] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2588.888352][T20173] __alloc_skb+0x19d/0x450 [ 2588.892777][T20173] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2588.898094][T20173] rtmsg_ifinfo+0x58/0xc0 [ 2588.902530][T20173] netdev_state_change+0x115/0x170 [ 2588.907653][T20173] do_setlink+0x24a/0x2410 [ 2588.912100][T20173] ? __nla_validate_parse+0x108f/0x1760 [ 2588.917651][T20173] ? __nla_parse+0x3c/0x50 [ 2588.922065][T20173] rtnl_newlink+0xb10/0x13b0 [ 2588.926737][T20173] ? __rcu_read_unlock+0x5c/0x290 [ 2588.931775][T20173] ? rtnl_setlink+0x2a0/0x2a0 [ 2588.936517][T20173] rtnetlink_rcv_msg+0x745/0x7e0 [ 2588.941464][T20173] ? ___cache_free+0x46/0x300 [ 2588.946144][T20173] ? kmem_cache_free+0x65/0x110 [ 2588.951072][T20173] ? __kfree_skb+0xfe/0x150 [ 2588.955644][T20173] ? consume_skb+0x48/0x160 [ 2588.960153][T20173] ? nlmon_xmit+0x5f/0x70 [ 2588.964667][T20173] ? __this_cpu_preempt_check+0x18/0x20 [ 2588.970249][T20173] ? __local_bh_enable_ip+0x4d/0x70 [ 2588.975527][T20173] ? local_bh_enable+0x1b/0x20 [ 2588.980363][T20173] ? __dev_queue_xmit+0x597/0xf70 [ 2588.985387][T20173] ? __skb_clone+0x2db/0x300 [ 2588.990100][T20173] ? __rcu_read_unlock+0x5c/0x290 [ 2588.995132][T20173] netlink_rcv_skb+0x14e/0x250 [ 2589.000172][T20173] ? rtnetlink_bind+0x60/0x60 [ 2589.004944][T20173] rtnetlink_rcv+0x18/0x20 [ 2589.009401][T20173] netlink_unicast+0x5fc/0x6c0 [ 2589.014183][T20173] netlink_sendmsg+0x726/0x840 [ 2589.018969][T20173] ? netlink_getsockopt+0x720/0x720 [ 2589.024228][T20173] ____sys_sendmsg+0x39a/0x510 [ 2589.029144][T20173] __sys_sendmsg+0x195/0x230 [ 2589.033789][T20173] __x64_sys_sendmsg+0x42/0x50 [ 2589.038588][T20173] do_syscall_64+0x44/0xd0 [ 2589.043012][T20173] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2589.048915][T20173] RIP: 0033:0x7f3f1b516ae9 [ 2589.053371][T20173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2589.073071][T20173] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2589.081561][T20173] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2589.089713][T20173] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2589.097682][T20173] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2589.105652][T20173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2589.113610][T20173] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2589.121692][T20173] [ 2589.130868][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2589.141102][T20173] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r1, 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=@known='user.incfs.size\x00') sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0x144, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x3c, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x38, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xec, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x8c, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0x144}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) r2 = open(&(0x7f0000000500)='./file0\x00', 0x60000, 0x5) sendmsg$nl_route(r2, &(0x7f0000001b40)={&(0x7f0000001a80)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001b00)={&(0x7f0000000700)=ANY=[@ANYBLOB="2c0000005200000227bd7000fbdbdf251c08000100", @ANYRES32=0x0, @ANYBLOB="0a000600000800000800060001000000000000c0ac29b47ac24ec32cb09253abeb19a8a5620c1b93150f8808afb472cc28d12688b4d777d80b16200851b048ed272fbfaf837d48d0f4378f00e88995a78c062b5cc439e92c63542341e2f11d3fd8cbef387d2d38"], 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x40) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) mount$9p_virtio(&(0x7f0000000780), &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800), 0x80, &(0x7f00000009c0)={'trans=virtio,', {[{@loose}, {@msize={'msize', 0x3d, 0x8}}, {@nodevmap}, {@access_uid}, {@dfltgid}, {@cache_fscache}, {@cache_mmap}], [{@subj_type={'subj_type', 0x3d, ' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, {@context={'context', 0x3d, 'unconfined_u'}}]}}) 03:35:29 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050c80)={0x9, [], 0x70, "23238578cb501c"}) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket(0x10, 0x80002, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r2, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1ad5a4d0ad8fe763972a0bade0fc8f6c1ae4c395ac824070e94eb9288f882d47adc16d5fc31b606072a47a4e1f9a54035eafb978a81b51d783d46c1808458c6aa46fd4be1253bbe85ca8c90af918d73ce3e793f671b5c1f1d123f018aa29e390a2856b761889f7bbdcc54c5a7d5881324be5b1654b20ef3ac784c3a5f37ca8f6f46d2bbbb9cb26547ed6f2922435c2c1ee5a1bba354ca2eed1b88d393d0dc8eba16bc60acf64a9a8b55ca1ed176d5ec62c7265187cf1d630fa7ac214ffd86c593b3bb07d1814052830999f9711c70a86", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c70cf4332c14f6e2c2abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f90327d6216e9760fcd648fa65655768fc440a61be189e36e2f665b20a01dd1e2c3be9c9a6964741360a8197159a93627c134fabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4cda923", @ANYRES32=r2, @ANYRES16=r1, @ANYRESOCT=r2, @ANYRES32=r4, @ANYRES64=r5, @ANYBLOB="493c9d23e4857d971ef801d0bdcd796b3fcaac9cc831ae8bcbcc6d4113d00413bc2ab67e298e6053a9cbe2ab654a12449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ec0b74ba8792b4060b8949"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) syz_io_uring_submit(r5, 0x0, &(0x7f00000000c0)=@IORING_OP_READ_FIXED={0x4, 0x1, 0x6000, @fd_index=0x7, 0x100000000, 0x4, 0x7, 0xf, 0x1, {0x2}}, 0x7) r7 = socket$nl_audit(0x10, 0x3, 0x9) recvmmsg(r7, &(0x7f0000001540)=[{{&(0x7f0000001380)=@ll, 0x80, &(0x7f0000001500)=[{&(0x7f0000001400)=""/215, 0xd7}, {&(0x7f0000001600)=""/214, 0xd6}, {&(0x7f0000001700)=""/215, 0xd7}, {&(0x7f0000003000)=""/4096, 0x1000}], 0x4}, 0x6}], 0x1, 0x102, &(0x7f0000001580)) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r8, 0x84, 0x1b, &(0x7f0000000340)={0x0, 0x1000, "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"}, &(0x7f0000000080)=0x1008) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x7000000) 03:35:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0xf710}]}, 0x28}}, 0x0) 03:35:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x0) 03:35:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 22) 03:35:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x1000000}]}, 0x28}}, 0x0) 03:35:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x8000000) 03:35:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0xffffff7f00000000) [ 2589.357367][T20191] FAULT_INJECTION: forcing a failure. [ 2589.357367][T20191] name failslab, interval 1, probability 0, space 0, times 0 [ 2589.370091][T20191] CPU: 1 PID: 20191 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2589.380327][T20191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2589.390427][T20191] Call Trace: [ 2589.393689][T20191] [ 2589.396602][T20191] dump_stack_lvl+0xd6/0x122 [ 2589.401289][T20191] dump_stack+0x11/0x1b [ 2589.405485][T20191] should_fail+0x23c/0x250 [ 2589.409960][T20191] __should_failslab+0x81/0x90 [ 2589.414711][T20191] should_failslab+0x5/0x20 [ 2589.419224][T20191] kmem_cache_alloc_node_trace+0x61/0x310 [ 2589.425004][T20191] ? __kmalloc_node_track_caller+0x30/0x40 [ 2589.430831][T20191] __kmalloc_node_track_caller+0x30/0x40 [ 2589.436544][T20191] ? netlink_trim+0x112/0x140 [ 2589.441208][T20191] pskb_expand_head+0xca/0x8b0 [ 2589.445969][T20191] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2589.451148][T20191] netlink_trim+0x112/0x140 [ 2589.455711][T20191] netlink_broadcast+0x42/0xad0 [ 2589.460595][T20191] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2589.466054][T20191] nlmsg_notify+0xc7/0x170 [ 2589.470527][T20191] rtmsg_ifinfo+0xa4/0xc0 [ 2589.474839][T20191] netdev_state_change+0x115/0x170 [ 2589.479942][T20191] do_setlink+0x24a/0x2410 [ 2589.484355][T20191] ? __nla_validate_parse+0x108f/0x1760 [ 2589.489908][T20191] ? __nla_parse+0x3c/0x50 [ 2589.494397][T20191] rtnl_newlink+0xb10/0x13b0 [ 2589.499081][T20191] ? __rcu_read_unlock+0x5c/0x290 [ 2589.504119][T20191] ? rtnl_setlink+0x2a0/0x2a0 [ 2589.508817][T20191] rtnetlink_rcv_msg+0x745/0x7e0 [ 2589.513821][T20191] ? ___cache_free+0x46/0x300 [ 2589.518481][T20191] ? kmem_cache_free+0x65/0x110 [ 2589.523441][T20191] ? __kfree_skb+0xfe/0x150 [ 2589.527951][T20191] ? consume_skb+0x48/0x160 [ 2589.532620][T20191] ? nlmon_xmit+0x5f/0x70 [ 2589.536941][T20191] ? __this_cpu_preempt_check+0x18/0x20 [ 2589.542544][T20191] ? __local_bh_enable_ip+0x4d/0x70 [ 2589.547776][T20191] ? local_bh_enable+0x1b/0x20 [ 2589.552534][T20191] ? __dev_queue_xmit+0x597/0xf70 [ 2589.557578][T20191] ? __skb_clone+0x2db/0x300 [ 2589.562217][T20191] ? __rcu_read_unlock+0x5c/0x290 [ 2589.567266][T20191] netlink_rcv_skb+0x14e/0x250 [ 2589.572049][T20191] ? rtnetlink_bind+0x60/0x60 [ 2589.576724][T20191] rtnetlink_rcv+0x18/0x20 [ 2589.581139][T20191] netlink_unicast+0x5fc/0x6c0 [ 2589.585901][T20191] netlink_sendmsg+0x726/0x840 [ 2589.590728][T20191] ? netlink_getsockopt+0x720/0x720 [ 2589.595909][T20191] ____sys_sendmsg+0x39a/0x510 [ 2589.600702][T20191] __sys_sendmsg+0x195/0x230 [ 2589.605290][T20191] __x64_sys_sendmsg+0x42/0x50 [ 2589.610095][T20191] do_syscall_64+0x44/0xd0 [ 2589.614600][T20191] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2589.620470][T20191] RIP: 0033:0x7f3f1b516ae9 [ 2589.624874][T20191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2589.644464][T20191] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2589.653050][T20191] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2589.661178][T20191] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2589.669140][T20191] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2589.677107][T20191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2589.685091][T20191] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2589.693069][T20191] 03:35:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 23) [ 2589.702726][T20191] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2589.713089][T20191] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000, 0x6f28d3c) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x9000000) 03:35:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x2000000}]}, 0x28}}, 0x0) [ 2589.942516][T20204] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2589.960510][T20205] FAULT_INJECTION: forcing a failure. [ 2589.960510][T20205] name failslab, interval 1, probability 0, space 0, times 0 [ 2589.973261][T20205] CPU: 0 PID: 20205 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2589.983459][T20205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2589.993570][T20205] Call Trace: [ 2589.997099][T20205] [ 2590.000056][T20205] dump_stack_lvl+0xd6/0x122 [ 2590.004808][T20205] dump_stack+0x11/0x1b [ 2590.009060][T20205] should_fail+0x23c/0x250 [ 2590.013460][T20205] __should_failslab+0x81/0x90 [ 2590.018220][T20205] should_failslab+0x5/0x20 [ 2590.022845][T20205] kmem_cache_alloc_node+0x61/0x2d0 [ 2590.028048][T20205] ? __rcu_read_unlock+0x5c/0x290 [ 2590.033095][T20205] ? fib_sync_up+0x51c/0x550 [ 2590.037769][T20205] ? __alloc_skb+0xf0/0x450 [ 2590.042315][T20205] __alloc_skb+0xf0/0x450 [ 2590.046636][T20205] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2590.052038][T20205] rtmsg_ifinfo+0x58/0xc0 [ 2590.056408][T20205] netdev_state_change+0x115/0x170 [ 2590.061682][T20205] do_setlink+0x24a/0x2410 [ 2590.066162][T20205] ? __nla_validate_parse+0x108f/0x1760 [ 2590.071831][T20205] ? __nla_parse+0x3c/0x50 [ 2590.076418][T20205] rtnl_newlink+0xb10/0x13b0 [ 2590.081019][T20205] ? __rcu_read_unlock+0x5c/0x290 [ 2590.086048][T20205] ? rtnl_setlink+0x2a0/0x2a0 [ 2590.091425][T20205] rtnetlink_rcv_msg+0x745/0x7e0 [ 2590.096369][T20205] ? ___cache_free+0x46/0x300 [ 2590.101178][T20205] ? kmem_cache_free+0x65/0x110 [ 2590.106185][T20205] ? __kfree_skb+0xfe/0x150 [ 2590.110722][T20205] ? consume_skb+0x48/0x160 [ 2590.115492][T20205] ? nlmon_xmit+0x5f/0x70 [ 2590.119849][T20205] ? __this_cpu_preempt_check+0x18/0x20 [ 2590.125388][T20205] ? __local_bh_enable_ip+0x4d/0x70 [ 2590.130638][T20205] ? local_bh_enable+0x1b/0x20 [ 2590.135392][T20205] ? __dev_queue_xmit+0x597/0xf70 03:35:29 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) preadv(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) 03:35:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) (fail_nth: 1) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xa000000) [ 2590.140417][T20205] ? __skb_clone+0x2db/0x300 [ 2590.144994][T20205] ? __rcu_read_unlock+0x5c/0x290 [ 2590.150040][T20205] netlink_rcv_skb+0x14e/0x250 [ 2590.154808][T20205] ? rtnetlink_bind+0x60/0x60 [ 2590.159502][T20205] rtnetlink_rcv+0x18/0x20 [ 2590.163910][T20205] netlink_unicast+0x5fc/0x6c0 [ 2590.168719][T20205] netlink_sendmsg+0x726/0x840 [ 2590.173694][T20205] ? netlink_getsockopt+0x720/0x720 [ 2590.179060][T20205] ____sys_sendmsg+0x39a/0x510 [ 2590.183888][T20205] __sys_sendmsg+0x195/0x230 [ 2590.188702][T20205] __x64_sys_sendmsg+0x42/0x50 03:35:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xb000000) [ 2590.193506][T20205] do_syscall_64+0x44/0xd0 [ 2590.197963][T20205] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2590.203868][T20205] RIP: 0033:0x7f3f1b516ae9 [ 2590.208353][T20205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2590.227951][T20205] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:35:29 executing program 5: r0 = syz_io_uring_setup(0x188, &(0x7f00000002c0), &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ef6000/0x4000)=nil, 0x4000, 0x0, 0x50, r1, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r4, &(0x7f0000000040)=@IORING_OP_SPLICE={0x1e, 0x1, 0x0, @fd_index=0x3, 0x114e, {0x0, r0}, 0x2009, 0x7, 0x0, {0x0, r5, r0}}, 0x10000) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) [ 2590.236388][T20205] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2590.244349][T20205] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2590.252321][T20205] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2590.260297][T20205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2590.268306][T20205] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2590.276273][T20205] [ 2590.285545][T20205] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x3000000}]}, 0x28}}, 0x0) 03:35:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 24) 03:35:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xc000000) [ 2590.298207][T20205] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2590.393406][T20221] FAULT_INJECTION: forcing a failure. [ 2590.393406][T20221] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2590.406586][T20221] CPU: 0 PID: 20221 Comm: syz-executor.4 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2590.414650][T20220] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2590.416733][T20221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:35:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000840)={&(0x7f00000005c0)={0x14, 0x1, 0x3, 0x801, 0x0, 0x0, {0x2, 0x0, 0x5}}, 0x14}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) lgetxattr(&(0x7f0000000800)='./file0\x00', &(0x7f0000000900)=@known='trusted.syz\x00', &(0x7f0000000940)=""/62, 0x3e) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000340)={@private0, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)=@gettfilter={0x44, 0x2e, 0x400, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, {0xffe0, 0xd}, {0xffff, 0x9}, {0xc, 0xc}}, [{0x8, 0xb, 0x7}, {0x8, 0xb, 0xa26b}, {0x8, 0xb, 0x4}, {0x8, 0xb, 0x7fffffff}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000061}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2590.435850][T20224] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2590.436194][T20221] Call Trace: [ 2590.436204][T20221] [ 2590.436211][T20221] dump_stack_lvl+0xd6/0x122 [ 2590.436235][T20221] dump_stack+0x11/0x1b [ 2590.436252][T20221] should_fail+0x23c/0x250 [ 2590.465052][T20221] should_fail_usercopy+0x16/0x20 [ 2590.470082][T20221] _copy_from_user+0x1c/0xd0 [ 2590.474683][T20221] vlan_ioctl_handler+0x52/0x7a0 [ 2590.479634][T20221] ? selinux_file_ioctl+0x522/0x590 [ 2590.484919][T20221] ? vlan_exit_net+0x20/0x20 [ 2590.489608][T20221] ? sock_poll+0x260/0x260 03:35:30 executing program 5: syz_io_uring_setup(0x188, &(0x7f00000002c0)={0x0, 0x0, 0x8}, &(0x7f0000ef6000/0x3000)=nil, &(0x7f0000eed000/0xd000)=nil, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1ad5a4d0ad8fe763972a0bade0fc8f6c1ae4c395ac824070e94eb9288f882d47adc16d5fc31b606072a47a4e1f9a54035eafb978a81b51d783d46c1808458c6aa46fd4be1253bbe85ca8c90af918d73ce3e793f671b5c1f1d123f018aa29e390a2856b761889f7bbdcc54c5a7d5881324be5b1654b20ef3ac784c3a5f37ca8f6f46d2bbbb9cb26547ed6f2922435c2c1ee5a1bba354ca2eed1b88d393d0dc8eba16bc60acf64a9a8b55ca1ed176d5ec62c7265187cf1d630fa7ac214ffd86c593b3bb07d1814052830999f9711c70a86", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c70cf4332c14f6e2c2abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f90327d6216e9760fcd648fa65655768fc440a61be189e36e2f665b20a01dd1e2c3be9c9a6964741360a8197159a93627c134fabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4cda923", @ANYRES32, @ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRES64=r1, @ANYBLOB="493c9d23e4857d971ef801d0bdcd796b3fcaac9cc831ae8bcbcc6d4113d00413bc2ab67e298e6053a9cbe2ab654a12449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ec0b74ba8792b4060b8949"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000), 0x4) r4 = socket(0x10, 0x80002, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000440)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x100000}, 0x0) syz_io_uring_setup(0x5d3, &(0x7f00000000c0), &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x40, &(0x7f0000000140)=0x307c, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00'}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000740)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1ad5a4d0ad8fe763972a0bade0fc8f6c1ae4c395ac824070e94eb9288f882d47adc16d5fc31b606072a47a4e1f9a54035eafb978a81b51d783d46c1808458c6aa46fd4be1253bbe85ca8c90af918d73ce3e793f671b5c1f1d123f018aa29e390a2856b761889f7bbdcc54c5a7d5881324be5b1654b20ef3ac784c3a5f37ca8f6f46d2bbbb9cb26547ed6f2922435c2c1ee5a1bba354ca2eed1b88d393d0dc8eba16bc60acf64a9a8b55ca1ed176d5ec62c7265187cf1d630fa7ac214ffd86c593b3bb07d1814052830999f9711c70a86", @ANYBLOB="018d85bac3db15219d097faf9a9f9b4faa13354cf69ac883f9bb34e1b257e1cf0667f62db4c6dc3edbd845b295787c70cf4332c14f6e2c2abe74c04210e574686e55c4038113f2cffe7cd8fc829989e6ead92a1ded529d1d0f90327d6216e9760fcd648fa65655768fc440a61be189e36e2f665b20a01dd1e2c3be9c9a6964741360a8197159a93627c134fabfc3c22d0a4dbdc3586ccea08542d557b2bfa1223fcb86072071da2b27a37d5e9cc6f0a22c1ef25f5e738752bab5f5ca8649e3571615478fa2279938ee1ad9932b7a6204d1afc70e5067ee41dc616ec6a9bb9509ceb5ccb5bfd1a15fc4cda923", @ANYRES32=r4, @ANYRES16=r3, @ANYRESOCT=r4, @ANYRES32=r6, @ANYRES64=r7, @ANYBLOB="493c9d23e4857d971ef801d0bdcd796b3fcaac9cc831ae8bcbcc6d4113d00413bc2ab67e298e6053a9cbe2ab654a12449c706876c8b436c956602b9ee86f4d3620dcc9a897ec818516e2498d2f77dafe85d8970cf484a6d67e70ed35ec0b74ba8792b4060b8949"], 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) syz_io_uring_submit(r1, r6, &(0x7f0000000040)=@IORING_OP_NOP={0x0, 0x5}, 0x3ff) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x4800, 0x0) [ 2590.494043][T20221] sock_ioctl+0x402/0x570 [ 2590.498488][T20221] ? sock_poll+0x260/0x260 [ 2590.502906][T20221] __se_sys_ioctl+0xcb/0x140 [ 2590.507502][T20221] __x64_sys_ioctl+0x3f/0x50 [ 2590.512132][T20221] do_syscall_64+0x44/0xd0 [ 2590.516621][T20221] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2590.518705][T20229] FAULT_INJECTION: forcing a failure. [ 2590.518705][T20229] name failslab, interval 1, probability 0, space 0, times 0 [ 2590.522575][T20221] RIP: 0033:0x7fac8daaeae9 [ 2590.522593][T20221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2590.559181][T20221] RSP: 002b:00007fac8d225188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2590.567627][T20221] RAX: ffffffffffffffda RBX: 00007fac8dbc1f60 RCX: 00007fac8daaeae9 [ 2590.575592][T20221] RDX: 0000000020000000 RSI: 0000000000008982 RDI: 0000000000000003 [ 2590.583621][T20221] RBP: 00007fac8d2251d0 R08: 0000000000000000 R09: 0000000000000000 03:35:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) (fail_nth: 2) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2590.591589][T20221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2590.599545][T20221] R13: 00007ffd2f75ea4f R14: 00007fac8d225300 R15: 0000000000022000 [ 2590.607606][T20221] [ 2590.610611][T20229] CPU: 1 PID: 20229 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2590.620830][T20229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2590.630906][T20229] Call Trace: [ 2590.634212][T20229] [ 2590.637128][T20229] dump_stack_lvl+0xd6/0x122 [ 2590.641707][T20229] dump_stack+0x11/0x1b [ 2590.645885][T20229] should_fail+0x23c/0x250 [ 2590.650541][T20229] __should_failslab+0x81/0x90 [ 2590.655422][T20229] should_failslab+0x5/0x20 [ 2590.660018][T20229] kmem_cache_alloc_node_trace+0x61/0x310 [ 2590.665881][T20229] ? __kmalloc_node_track_caller+0x30/0x40 [ 2590.671759][T20229] __kmalloc_node_track_caller+0x30/0x40 [ 2590.677532][T20229] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2590.683067][T20229] __alloc_skb+0x19d/0x450 [ 2590.687809][T20229] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2590.693098][T20229] rtmsg_ifinfo+0x58/0xc0 [ 2590.697530][T20229] netdev_state_change+0x115/0x170 [ 2590.702717][T20229] do_setlink+0x24a/0x2410 [ 2590.707130][T20229] ? __nla_validate_parse+0x108f/0x1760 [ 2590.712659][T20229] ? __nla_parse+0x3c/0x50 [ 2590.717067][T20229] rtnl_newlink+0xb10/0x13b0 [ 2590.721668][T20229] ? __rcu_read_unlock+0x5c/0x290 [ 2590.726765][T20229] ? rtnl_setlink+0x2a0/0x2a0 [ 2590.731472][T20229] rtnetlink_rcv_msg+0x745/0x7e0 [ 2590.736422][T20229] ? ___cache_free+0x46/0x300 [ 2590.741092][T20229] ? kmem_cache_free+0x65/0x110 [ 2590.746220][T20229] ? __kfree_skb+0xfe/0x150 [ 2590.750797][T20229] ? consume_skb+0x48/0x160 [ 2590.755342][T20229] ? nlmon_xmit+0x5f/0x70 [ 2590.759654][T20229] ? __this_cpu_preempt_check+0x18/0x20 [ 2590.765231][T20229] ? __local_bh_enable_ip+0x4d/0x70 [ 2590.770417][T20229] ? local_bh_enable+0x1b/0x20 [ 2590.775188][T20229] ? __dev_queue_xmit+0x597/0xf70 [ 2590.780216][T20229] ? __skb_clone+0x2db/0x300 [ 2590.784800][T20229] ? __rcu_read_unlock+0x5c/0x290 [ 2590.789817][T20229] netlink_rcv_skb+0x14e/0x250 [ 2590.794721][T20229] ? rtnetlink_bind+0x60/0x60 [ 2590.799380][T20229] rtnetlink_rcv+0x18/0x20 [ 2590.803911][T20229] netlink_unicast+0x5fc/0x6c0 [ 2590.808759][T20229] netlink_sendmsg+0x726/0x840 [ 2590.813556][T20229] ? netlink_getsockopt+0x720/0x720 [ 2590.818782][T20229] ____sys_sendmsg+0x39a/0x510 [ 2590.823527][T20229] __sys_sendmsg+0x195/0x230 [ 2590.828196][T20229] __x64_sys_sendmsg+0x42/0x50 [ 2590.832949][T20229] do_syscall_64+0x44/0xd0 [ 2590.837385][T20229] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2590.843390][T20229] RIP: 0033:0x7f3f1b516ae9 [ 2590.847793][T20229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2590.867465][T20229] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2590.875956][T20229] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2590.884272][T20229] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2590.892219][T20229] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2590.900343][T20229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2590.908340][T20229] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2590.916305][T20229] [ 2590.926465][T20229] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x4000000}]}, 0x28}}, 0x0) 03:35:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 25) 03:35:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xd000000) [ 2590.936349][T20229] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 1) [ 2591.160425][T20239] FAULT_INJECTION: forcing a failure. [ 2591.160425][T20239] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2591.173561][T20239] CPU: 1 PID: 20239 Comm: syz-executor.4 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2591.183694][T20239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2591.193735][T20239] Call Trace: [ 2591.196999][T20239] [ 2591.199927][T20239] dump_stack_lvl+0xd6/0x122 [ 2591.204508][T20239] dump_stack+0x11/0x1b [ 2591.208662][T20239] should_fail+0x23c/0x250 [ 2591.213079][T20239] should_fail_usercopy+0x16/0x20 [ 2591.218144][T20239] _copy_to_user+0x1c/0x90 [ 2591.222558][T20239] simple_read_from_buffer+0xab/0x120 [ 2591.227992][T20239] proc_fail_nth_read+0x10d/0x150 [ 2591.233005][T20239] ? proc_fault_inject_write+0x230/0x230 [ 2591.238622][T20239] vfs_read+0x1e6/0x750 [ 2591.242938][T20239] ? __fget_files+0x20d/0x220 [ 2591.247650][T20239] ksys_read+0xd9/0x190 [ 2591.251787][T20239] __x64_sys_read+0x3e/0x50 [ 2591.256320][T20239] do_syscall_64+0x44/0xd0 [ 2591.260873][T20239] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2591.266761][T20239] RIP: 0033:0x7fac8da6169c [ 2591.271243][T20239] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2591.290915][T20239] RSP: 002b:00007fac8d225170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2591.299307][T20239] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fac8da6169c 03:35:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0009d6e8be3e00530bbf6da70024f1a157d6bc56aaed", @ANYRES32=0x0, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) 03:35:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x5000000}]}, 0x28}}, 0x0) [ 2591.307267][T20239] RDX: 000000000000000f RSI: 00007fac8d2251e0 RDI: 0000000000000004 [ 2591.315234][T20239] RBP: 00007fac8d2251d0 R08: 0000000000000000 R09: 0000000000000000 [ 2591.323188][T20239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2591.331152][T20239] R13: 00007ffd2f75ea4f R14: 00007fac8d225300 R15: 0000000000022000 [ 2591.339103][T20239] [ 2591.394404][T20248] FAULT_INJECTION: forcing a failure. [ 2591.394404][T20248] name failslab, interval 1, probability 0, space 0, times 0 [ 2591.407185][T20248] CPU: 1 PID: 20248 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2591.417333][T20248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2591.427427][T20248] Call Trace: [ 2591.430687][T20248] [ 2591.433611][T20248] dump_stack_lvl+0xd6/0x122 [ 2591.438257][T20248] dump_stack+0x11/0x1b [ 2591.442397][T20248] should_fail+0x23c/0x250 [ 2591.446865][T20248] __should_failslab+0x81/0x90 [ 2591.452873][T20248] should_failslab+0x5/0x20 [ 2591.457426][T20248] kmem_cache_alloc_node_trace+0x61/0x310 [ 2591.463236][T20248] ? __kmalloc_node_track_caller+0x30/0x40 [ 2591.469078][T20248] __kmalloc_node_track_caller+0x30/0x40 [ 2591.474740][T20248] ? netlink_trim+0x112/0x140 [ 2591.479400][T20248] pskb_expand_head+0xca/0x8b0 [ 2591.484168][T20248] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2591.489352][T20248] netlink_trim+0x112/0x140 [ 2591.493958][T20248] netlink_broadcast+0x42/0xad0 [ 2591.498886][T20248] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2591.504437][T20248] nlmsg_notify+0xc7/0x170 [ 2591.508873][T20248] rtmsg_ifinfo+0xa4/0xc0 [ 2591.513182][T20248] netdev_state_change+0x115/0x170 [ 2591.518274][T20248] do_setlink+0x24a/0x2410 [ 2591.522710][T20248] ? __nla_validate_parse+0x108f/0x1760 [ 2591.528233][T20248] ? __nla_parse+0x3c/0x50 [ 2591.532625][T20248] rtnl_newlink+0xb10/0x13b0 [ 2591.537308][T20248] ? __rcu_read_unlock+0x5c/0x290 [ 2591.542357][T20248] ? rtnl_setlink+0x2a0/0x2a0 [ 2591.547016][T20248] rtnetlink_rcv_msg+0x745/0x7e0 [ 2591.552454][T20248] ? ___cache_free+0x46/0x300 [ 2591.557124][T20248] ? kmem_cache_free+0x65/0x110 [ 2591.562023][T20248] ? __kfree_skb+0xfe/0x150 [ 2591.566502][T20248] ? consume_skb+0x48/0x160 [ 2591.571037][T20248] ? nlmon_xmit+0x5f/0x70 [ 2591.575346][T20248] ? __this_cpu_preempt_check+0x18/0x20 [ 2591.580877][T20248] ? __local_bh_enable_ip+0x4d/0x70 [ 2591.586403][T20248] ? local_bh_enable+0x1b/0x20 [ 2591.591231][T20248] ? __dev_queue_xmit+0x597/0xf70 [ 2591.596517][T20248] ? __skb_clone+0x2db/0x300 [ 2591.601084][T20248] ? __rcu_read_unlock+0x5c/0x290 [ 2591.606148][T20248] netlink_rcv_skb+0x14e/0x250 [ 2591.610891][T20248] ? rtnetlink_bind+0x60/0x60 [ 2591.615546][T20248] rtnetlink_rcv+0x18/0x20 [ 2591.621463][T20248] netlink_unicast+0x5fc/0x6c0 [ 2591.626225][T20248] netlink_sendmsg+0x726/0x840 [ 2591.631054][T20248] ? netlink_getsockopt+0x720/0x720 [ 2591.636377][T20248] ____sys_sendmsg+0x39a/0x510 [ 2591.641198][T20248] __sys_sendmsg+0x195/0x230 [ 2591.645834][T20248] __x64_sys_sendmsg+0x42/0x50 [ 2591.650575][T20248] do_syscall_64+0x44/0xd0 [ 2591.654971][T20248] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2591.660929][T20248] RIP: 0033:0x7f3f1b516ae9 [ 2591.665377][T20248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2591.684964][T20248] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2591.693370][T20248] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2591.701317][T20248] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2591.709355][T20248] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2591.717306][T20248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2591.725430][T20248] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2591.733615][T20248] 03:35:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xe000000) 03:35:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 26) [ 2591.741786][T20248] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2591.751791][T20248] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x2, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2591.949373][T20254] FAULT_INJECTION: forcing a failure. [ 2591.949373][T20254] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2591.962629][T20254] CPU: 0 PID: 20254 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2591.972895][T20254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2591.982949][T20254] Call Trace: [ 2591.986222][T20254] [ 2591.989156][T20254] dump_stack_lvl+0xd6/0x122 [ 2591.993756][T20254] dump_stack+0x11/0x1b 03:35:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x6000000}]}, 0x28}}, 0x0) [ 2591.997967][T20254] should_fail+0x23c/0x250 [ 2592.002389][T20254] should_fail_usercopy+0x16/0x20 [ 2592.007639][T20254] _copy_from_user+0x1c/0xd0 [ 2592.012217][T20254] sendmsg_copy_msghdr+0x60/0x2a0 [ 2592.017261][T20254] __sys_sendmsg+0x166/0x230 [ 2592.019009][T20259] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2592.021878][T20254] __x64_sys_sendmsg+0x42/0x50 [ 2592.021946][T20254] do_syscall_64+0x44/0xd0 [ 2592.021967][T20254] entry_SYSCALL_64_after_hwframe+0x44/0xae 03:35:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x10000000) [ 2592.021993][T20254] RIP: 0033:0x7f2f40028ae9 [ 2592.022008][T20254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2592.022044][T20254] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 [ 2592.036331][T20259] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2592.040551][T20254] ORIG_RAX: 000000000000002e [ 2592.040561][T20254] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 03:35:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 2) [ 2592.040574][T20254] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2592.040586][T20254] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2592.040597][T20254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2592.040608][T20254] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2592.053997][T20260] FAULT_INJECTION: forcing a failure. [ 2592.053997][T20260] name failslab, interval 1, probability 0, space 0, times 0 [ 2592.070794][T20254] [ 2592.082514][T20262] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2592.086335][T20260] CPU: 1 PID: 20260 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2592.166011][T20260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2592.176152][T20260] Call Trace: [ 2592.179431][T20260] [ 2592.182342][T20260] dump_stack_lvl+0xd6/0x122 [ 2592.187078][T20260] dump_stack+0x11/0x1b [ 2592.191233][T20260] should_fail+0x23c/0x250 [ 2592.195634][T20260] __should_failslab+0x81/0x90 [ 2592.200383][T20260] should_failslab+0x5/0x20 [ 2592.204918][T20260] kmem_cache_alloc_node+0x61/0x2d0 [ 2592.210174][T20260] ? __rcu_read_unlock+0x5c/0x290 [ 2592.215195][T20260] ? delay_tsc+0x96/0xe0 [ 2592.219580][T20260] ? __alloc_skb+0xf0/0x450 [ 2592.224162][T20260] __alloc_skb+0xf0/0x450 [ 2592.228498][T20260] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2592.233789][T20260] rtmsg_ifinfo+0x58/0xc0 [ 2592.238204][T20260] netdev_state_change+0x115/0x170 [ 2592.243485][T20260] do_setlink+0x24a/0x2410 [ 2592.248245][T20260] ? __nla_validate_parse+0x108f/0x1760 [ 2592.253949][T20260] ? __nla_parse+0x3c/0x50 [ 2592.258362][T20260] rtnl_newlink+0xb10/0x13b0 [ 2592.262947][T20260] ? __rcu_read_unlock+0x5c/0x290 [ 2592.268034][T20260] ? rtnl_setlink+0x2a0/0x2a0 [ 2592.272839][T20260] rtnetlink_rcv_msg+0x745/0x7e0 [ 2592.278035][T20260] ? ___cache_free+0x46/0x300 [ 2592.282795][T20260] ? kmem_cache_free+0x65/0x110 [ 2592.287720][T20260] ? __kfree_skb+0xfe/0x150 [ 2592.292309][T20260] ? consume_skb+0x48/0x160 [ 2592.296920][T20260] ? nlmon_xmit+0x5f/0x70 [ 2592.301326][T20260] ? __this_cpu_preempt_check+0x18/0x20 [ 2592.306951][T20260] ? __local_bh_enable_ip+0x4d/0x70 [ 2592.312182][T20260] ? local_bh_enable+0x1b/0x20 [ 2592.316937][T20260] ? __dev_queue_xmit+0x597/0xf70 [ 2592.321941][T20260] ? __skb_clone+0x2db/0x300 [ 2592.326544][T20260] ? __rcu_read_unlock+0x5c/0x290 [ 2592.331603][T20260] netlink_rcv_skb+0x14e/0x250 [ 2592.336349][T20260] ? rtnetlink_bind+0x60/0x60 [ 2592.341070][T20260] rtnetlink_rcv+0x18/0x20 [ 2592.345597][T20260] netlink_unicast+0x5fc/0x6c0 [ 2592.350507][T20260] netlink_sendmsg+0x726/0x840 [ 2592.355293][T20260] ? netlink_getsockopt+0x720/0x720 [ 2592.360542][T20260] ____sys_sendmsg+0x39a/0x510 [ 2592.365309][T20260] __sys_sendmsg+0x195/0x230 [ 2592.369916][T20260] __x64_sys_sendmsg+0x42/0x50 [ 2592.374705][T20260] do_syscall_64+0x44/0xd0 [ 2592.379102][T20260] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2592.385132][T20260] RIP: 0033:0x7f3f1b516ae9 [ 2592.389593][T20260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2592.409315][T20260] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2592.417716][T20260] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2592.425721][T20260] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2592.433759][T20260] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2592.441711][T20260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:35:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 27) 03:35:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000900)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_PAYLOAD={0x0, 0xa, "2ed5643a9f3c6b96fc7bebeb707df5f96badf3e391505aecad0a9f72c298e0d66b099bd6639d672dc2f6df9d4d01117a955dd8f947f6b90fd90ae3a1f86406f3869864"}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @remote}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @rand_addr=' \x01\x00'}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2592.449751][T20260] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2592.457710][T20260] [ 2592.465928][T20260] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2592.475686][T20260] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2592.491342][T20263] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x4b47, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x7000000}]}, 0x28}}, 0x0) 03:35:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x11000000) [ 2592.701238][T20274] FAULT_INJECTION: forcing a failure. [ 2592.701238][T20274] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2592.714448][T20274] CPU: 0 PID: 20274 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2592.724601][T20274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2592.726613][T20275] FAULT_INJECTION: forcing a failure. [ 2592.726613][T20275] name failslab, interval 1, probability 0, space 0, times 0 [ 2592.734769][T20274] Call Trace: [ 2592.734778][T20274] [ 2592.734785][T20274] dump_stack_lvl+0xd6/0x122 [ 2592.734810][T20274] dump_stack+0x11/0x1b [ 2592.734847][T20274] should_fail+0x23c/0x250 [ 2592.766909][T20274] should_fail_usercopy+0x16/0x20 [ 2592.771930][T20274] _copy_from_user+0x1c/0xd0 [ 2592.776544][T20274] iovec_from_user+0xc4/0x2e0 [ 2592.781212][T20274] __import_iovec+0x57/0x2d0 [ 2592.785788][T20274] import_iovec+0xb8/0xd0 [ 2592.790189][T20274] sendmsg_copy_msghdr+0x275/0x2a0 [ 2592.795338][T20274] __sys_sendmsg+0x166/0x230 [ 2592.799922][T20274] __x64_sys_sendmsg+0x42/0x50 [ 2592.804693][T20274] do_syscall_64+0x44/0xd0 [ 2592.809099][T20274] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2592.815000][T20274] RIP: 0033:0x7f2f40028ae9 [ 2592.819446][T20274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2592.839211][T20274] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:35:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 3) [ 2592.847729][T20274] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2592.855817][T20274] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2592.863773][T20274] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2592.871745][T20274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2592.879701][T20274] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2592.887664][T20274] [ 2592.890704][T20275] CPU: 1 PID: 20275 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2592.900877][T20275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2592.911062][T20275] Call Trace: [ 2592.914331][T20275] [ 2592.917242][T20275] dump_stack_lvl+0xd6/0x122 [ 2592.921949][T20275] dump_stack+0x11/0x1b [ 2592.926124][T20275] should_fail+0x23c/0x250 [ 2592.930614][T20275] __should_failslab+0x81/0x90 [ 2592.935424][T20275] should_failslab+0x5/0x20 [ 2592.939932][T20275] kmem_cache_alloc_node_trace+0x61/0x310 [ 2592.945662][T20275] ? __kmalloc_node_track_caller+0x30/0x40 [ 2592.951454][T20275] __kmalloc_node_track_caller+0x30/0x40 [ 2592.957063][T20275] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2592.962530][T20275] __alloc_skb+0x19d/0x450 [ 2592.967076][T20275] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2592.972367][T20275] rtmsg_ifinfo+0x58/0xc0 [ 2592.976764][T20275] netdev_state_change+0x115/0x170 [ 2592.982080][T20275] do_setlink+0x24a/0x2410 [ 2592.986542][T20275] ? __nla_validate_parse+0x108f/0x1760 [ 2592.992183][T20275] ? __nla_parse+0x3c/0x50 [ 2592.996595][T20275] rtnl_newlink+0xb10/0x13b0 [ 2593.001238][T20275] ? __rcu_read_unlock+0x5c/0x290 [ 2593.006308][T20275] ? rtnl_setlink+0x2a0/0x2a0 [ 2593.010981][T20275] rtnetlink_rcv_msg+0x745/0x7e0 [ 2593.015903][T20275] ? ___cache_free+0x46/0x300 [ 2593.020572][T20275] ? kmem_cache_free+0x65/0x110 [ 2593.025425][T20275] ? __kfree_skb+0xfe/0x150 [ 2593.029970][T20275] ? consume_skb+0x48/0x160 [ 2593.034468][T20275] ? nlmon_xmit+0x5f/0x70 [ 2593.038779][T20275] ? __this_cpu_preempt_check+0x18/0x20 [ 2593.044489][T20275] ? __local_bh_enable_ip+0x4d/0x70 [ 2593.049708][T20275] ? local_bh_enable+0x1b/0x20 [ 2593.054456][T20275] ? __dev_queue_xmit+0x597/0xf70 [ 2593.059473][T20275] ? __skb_clone+0x2db/0x300 [ 2593.064048][T20275] ? __rcu_read_unlock+0x5c/0x290 [ 2593.069056][T20275] netlink_rcv_skb+0x14e/0x250 [ 2593.073811][T20275] ? rtnetlink_bind+0x60/0x60 [ 2593.078501][T20275] rtnetlink_rcv+0x18/0x20 [ 2593.082951][T20275] netlink_unicast+0x5fc/0x6c0 [ 2593.087779][T20275] netlink_sendmsg+0x726/0x840 [ 2593.092527][T20275] ? netlink_getsockopt+0x720/0x720 [ 2593.097719][T20275] ____sys_sendmsg+0x39a/0x510 [ 2593.102488][T20275] __sys_sendmsg+0x195/0x230 [ 2593.107131][T20275] __x64_sys_sendmsg+0x42/0x50 [ 2593.111877][T20275] do_syscall_64+0x44/0xd0 [ 2593.116348][T20275] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2593.122234][T20275] RIP: 0033:0x7f3f1b516ae9 [ 2593.126638][T20275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2593.146347][T20275] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2593.154745][T20275] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2593.162898][T20275] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2593.170861][T20275] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2593.178809][T20275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2593.186759][T20275] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2593.194714][T20275] 03:35:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 28) [ 2593.203501][T20275] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2593.213642][T20275] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0x60, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x3c, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x38, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0xa6c}]}, 0x60}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2593.257805][T20276] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2593.269358][T20276] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x4b49, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x8000000}]}, 0x28}}, 0x0) 03:35:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x12000000) [ 2593.451344][T20288] FAULT_INJECTION: forcing a failure. [ 2593.451344][T20288] name failslab, interval 1, probability 0, space 0, times 0 [ 2593.463994][T20288] CPU: 0 PID: 20288 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2593.473386][T20289] FAULT_INJECTION: forcing a failure. [ 2593.473386][T20289] name failslab, interval 1, probability 0, space 0, times 0 [ 2593.474261][T20288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2593.474273][T20288] Call Trace: [ 2593.474279][T20288] [ 2593.474286][T20288] dump_stack_lvl+0xd6/0x122 [ 2593.507896][T20288] dump_stack+0x11/0x1b [ 2593.512056][T20288] should_fail+0x23c/0x250 [ 2593.516455][T20288] __should_failslab+0x81/0x90 [ 2593.521207][T20288] should_failslab+0x5/0x20 [ 2593.525698][T20288] kmem_cache_alloc_node+0x61/0x2d0 [ 2593.530928][T20288] ? __alloc_skb+0xf0/0x450 [ 2593.535419][T20288] __alloc_skb+0xf0/0x450 [ 2593.539788][T20288] netlink_sendmsg+0x4fe/0x840 [ 2593.544631][T20288] ? netlink_getsockopt+0x720/0x720 [ 2593.549928][T20288] ____sys_sendmsg+0x39a/0x510 [ 2593.554686][T20288] __sys_sendmsg+0x195/0x230 [ 2593.559300][T20288] __x64_sys_sendmsg+0x42/0x50 [ 2593.564341][T20288] do_syscall_64+0x44/0xd0 [ 2593.568836][T20288] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2593.574728][T20288] RIP: 0033:0x7f2f40028ae9 [ 2593.579129][T20288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2593.598718][T20288] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2593.607129][T20288] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2593.615218][T20288] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2593.623174][T20288] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2593.631127][T20288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2593.639134][T20288] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2593.647092][T20288] 03:35:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 4) [ 2593.650146][T20289] CPU: 1 PID: 20289 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2593.660311][T20289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2593.670494][T20289] Call Trace: [ 2593.673764][T20289] [ 2593.676684][T20289] dump_stack_lvl+0xd6/0x122 [ 2593.681302][T20289] dump_stack+0x11/0x1b [ 2593.685494][T20289] should_fail+0x23c/0x250 [ 2593.689985][T20289] __should_failslab+0x81/0x90 [ 2593.694754][T20289] should_failslab+0x5/0x20 [ 2593.699251][T20289] kmem_cache_alloc_node_trace+0x61/0x310 [ 2593.705560][T20289] ? __kmalloc_node_track_caller+0x30/0x40 [ 2593.711455][T20289] __kmalloc_node_track_caller+0x30/0x40 [ 2593.717196][T20289] ? netlink_trim+0x112/0x140 [ 2593.721913][T20289] pskb_expand_head+0xca/0x8b0 [ 2593.726661][T20289] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2593.731909][T20289] netlink_trim+0x112/0x140 [ 2593.736396][T20289] netlink_broadcast+0x42/0xad0 [ 2593.741330][T20289] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2593.746848][T20289] nlmsg_notify+0xc7/0x170 [ 2593.751327][T20289] rtmsg_ifinfo+0xa4/0xc0 [ 2593.755835][T20289] netdev_state_change+0x115/0x170 [ 2593.760935][T20289] do_setlink+0x24a/0x2410 [ 2593.765370][T20289] ? __nla_validate_parse+0x108f/0x1760 [ 2593.771047][T20289] ? __nla_parse+0x3c/0x50 [ 2593.775501][T20289] rtnl_newlink+0xb10/0x13b0 [ 2593.780192][T20289] ? __rcu_read_unlock+0x5c/0x290 [ 2593.785266][T20289] ? rtnl_setlink+0x2a0/0x2a0 [ 2593.789923][T20289] rtnetlink_rcv_msg+0x745/0x7e0 [ 2593.794880][T20289] ? ___cache_free+0x46/0x300 [ 2593.799708][T20289] ? kmem_cache_free+0x65/0x110 [ 2593.804549][T20289] ? __kfree_skb+0xfe/0x150 [ 2593.809045][T20289] ? consume_skb+0x48/0x160 [ 2593.813606][T20289] ? nlmon_xmit+0x5f/0x70 [ 2593.817916][T20289] ? __this_cpu_preempt_check+0x18/0x20 [ 2593.823442][T20289] ? __local_bh_enable_ip+0x4d/0x70 [ 2593.828663][T20289] ? local_bh_enable+0x1b/0x20 [ 2593.833466][T20289] ? __dev_queue_xmit+0x597/0xf70 [ 2593.838498][T20289] ? __skb_clone+0x2db/0x300 [ 2593.843069][T20289] ? __rcu_read_unlock+0x5c/0x290 [ 2593.848073][T20289] netlink_rcv_skb+0x14e/0x250 [ 2593.852824][T20289] ? rtnetlink_bind+0x60/0x60 [ 2593.857577][T20289] rtnetlink_rcv+0x18/0x20 [ 2593.862137][T20289] netlink_unicast+0x5fc/0x6c0 [ 2593.866902][T20289] netlink_sendmsg+0x726/0x840 [ 2593.871707][T20289] ? netlink_getsockopt+0x720/0x720 [ 2593.876976][T20289] ____sys_sendmsg+0x39a/0x510 [ 2593.881782][T20289] __sys_sendmsg+0x195/0x230 [ 2593.886432][T20289] __x64_sys_sendmsg+0x42/0x50 [ 2593.891269][T20289] do_syscall_64+0x44/0xd0 [ 2593.895690][T20289] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2593.901570][T20289] RIP: 0033:0x7f3f1b516ae9 [ 2593.905965][T20289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2593.925900][T20289] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2593.934308][T20289] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2593.942267][T20289] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2593.950229][T20289] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2593.958188][T20289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2593.966404][T20289] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2593.974376][T20289] [ 2593.986824][T20289] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 29) [ 2593.996710][T20289] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x541b, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:33 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000700)={'syztnl1\x00', 0x0, 0x4, 0x7, 0xf8, 0x800, 0x8, @local, @rand_addr=' \x01\x00', 0x8000, 0x700, 0x3f, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000340)={'ip6tnl0\x00', &(0x7f0000000780)={'sit0\x00', r0, 0x29, 0x8, 0x0, 0x1, 0x0, @remote, @empty, 0x0, 0x8, 0x3, 0x8}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r2, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000940)=ANY=[@ANYBLOB="20000000020600000000000000000000270000010900020073797a3100000000a6c335d3d54887c7322be6994e6028873e75cd56a5fec25ea7488b39fcace79142901b5b9845a98f4014f918aab39899bb93435241f5a8138a58458d12f49e1b5126af83dd2b3bcf31f063671a6ad4f24009d124a17935021505ed745113260ff6d34a7a36f5727258057a87cfa2"], 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000800)={0x0, 0xffff}, &(0x7f0000000900)=0x8) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x9000000}]}, 0x28}}, 0x0) 03:35:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x1ffff000) [ 2594.209393][T20302] FAULT_INJECTION: forcing a failure. [ 2594.209393][T20302] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.222064][T20302] CPU: 0 PID: 20302 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2594.232363][T20302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2594.242526][T20302] Call Trace: [ 2594.245860][T20302] [ 2594.248937][T20302] dump_stack_lvl+0xd6/0x122 [ 2594.253534][T20302] dump_stack+0x11/0x1b [ 2594.256234][T20305] FAULT_INJECTION: forcing a failure. [ 2594.256234][T20305] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.257780][T20302] should_fail+0x23c/0x250 [ 2594.274849][T20302] __should_failslab+0x81/0x90 [ 2594.279637][T20302] should_failslab+0x5/0x20 [ 2594.284186][T20302] kmem_cache_alloc_node_trace+0x61/0x310 [ 2594.289947][T20302] ? __kmalloc_node_track_caller+0x30/0x40 [ 2594.295792][T20302] __kmalloc_node_track_caller+0x30/0x40 [ 2594.301530][T20302] ? netlink_sendmsg+0x4fe/0x840 [ 2594.306459][T20302] __alloc_skb+0x19d/0x450 [ 2594.310867][T20302] netlink_sendmsg+0x4fe/0x840 [ 2594.315693][T20302] ? netlink_getsockopt+0x720/0x720 [ 2594.320968][T20302] ____sys_sendmsg+0x39a/0x510 [ 2594.325895][T20302] __sys_sendmsg+0x195/0x230 [ 2594.331160][T20302] __x64_sys_sendmsg+0x42/0x50 [ 2594.335920][T20302] do_syscall_64+0x44/0xd0 [ 2594.340324][T20302] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2594.346314][T20302] RIP: 0033:0x7f2f40028ae9 [ 2594.350714][T20302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2594.370319][T20302] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2594.378721][T20302] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2594.386677][T20302] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2594.394717][T20302] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 03:35:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 5) [ 2594.402682][T20302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2594.410726][T20302] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2594.418684][T20302] [ 2594.421806][T20305] CPU: 1 PID: 20305 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2594.432123][T20305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2594.442230][T20305] Call Trace: [ 2594.445676][T20305] [ 2594.448597][T20305] dump_stack_lvl+0xd6/0x122 [ 2594.453198][T20305] dump_stack+0x11/0x1b [ 2594.457333][T20305] should_fail+0x23c/0x250 [ 2594.461749][T20305] __should_failslab+0x81/0x90 [ 2594.466563][T20305] should_failslab+0x5/0x20 [ 2594.471056][T20305] kmem_cache_alloc_node+0x61/0x2d0 [ 2594.476322][T20305] ? __rcu_read_unlock+0x5c/0x290 [ 2594.481461][T20305] ? fib_sync_up+0x51c/0x550 [ 2594.486043][T20305] ? __alloc_skb+0xf0/0x450 [ 2594.490614][T20305] __alloc_skb+0xf0/0x450 [ 2594.494932][T20305] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2594.500204][T20305] rtmsg_ifinfo+0x58/0xc0 [ 2594.504678][T20305] netdev_state_change+0x115/0x170 [ 2594.509871][T20305] do_setlink+0x24a/0x2410 [ 2594.514284][T20305] ? __nla_validate_parse+0x108f/0x1760 [ 2594.519821][T20305] ? __nla_parse+0x3c/0x50 [ 2594.524283][T20305] rtnl_newlink+0xb10/0x13b0 [ 2594.528862][T20305] ? __rcu_read_unlock+0x5c/0x290 [ 2594.533866][T20305] ? rtnl_setlink+0x2a0/0x2a0 [ 2594.538619][T20305] rtnetlink_rcv_msg+0x745/0x7e0 [ 2594.543536][T20305] ? ___cache_free+0x46/0x300 [ 2594.548298][T20305] ? kmem_cache_free+0x65/0x110 [ 2594.553146][T20305] ? __kfree_skb+0xfe/0x150 [ 2594.557753][T20305] ? consume_skb+0x48/0x160 [ 2594.562282][T20305] ? nlmon_xmit+0x5f/0x70 [ 2594.566705][T20305] ? __this_cpu_preempt_check+0x18/0x20 [ 2594.572250][T20305] ? __local_bh_enable_ip+0x4d/0x70 [ 2594.577446][T20305] ? local_bh_enable+0x1b/0x20 [ 2594.582278][T20305] ? __dev_queue_xmit+0x597/0xf70 [ 2594.587282][T20305] ? __skb_clone+0x2db/0x300 [ 2594.591940][T20305] ? __rcu_read_unlock+0x5c/0x290 [ 2594.596961][T20305] netlink_rcv_skb+0x14e/0x250 [ 2594.602001][T20305] ? rtnetlink_bind+0x60/0x60 [ 2594.606655][T20305] rtnetlink_rcv+0x18/0x20 [ 2594.611140][T20305] netlink_unicast+0x5fc/0x6c0 [ 2594.615919][T20305] netlink_sendmsg+0x726/0x840 [ 2594.620698][T20305] ? netlink_getsockopt+0x720/0x720 [ 2594.625883][T20305] ____sys_sendmsg+0x39a/0x510 [ 2594.630715][T20305] __sys_sendmsg+0x195/0x230 [ 2594.635345][T20305] __x64_sys_sendmsg+0x42/0x50 [ 2594.640110][T20305] do_syscall_64+0x44/0xd0 [ 2594.644534][T20305] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2594.650457][T20305] RIP: 0033:0x7f3f1b516ae9 [ 2594.654863][T20305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2594.674461][T20305] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2594.682848][T20305] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2594.690794][T20305] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2594.698775][T20305] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 03:35:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 30) 03:35:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x5421, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2594.706719][T20305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2594.714683][T20305] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2594.722641][T20305] [ 2594.730543][T20305] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2594.740092][T20305] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=@known='user.incfs.metadata\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x2001, 0x54) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2594.803821][T20308] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2594.814978][T20308] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0xa000000}]}, 0x28}}, 0x0) 03:35:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x20000000) 03:35:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x5450, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2594.941981][T20318] FAULT_INJECTION: forcing a failure. [ 2594.941981][T20318] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2594.955362][T20318] CPU: 0 PID: 20318 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2594.965520][T20318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2594.969676][T20322] FAULT_INJECTION: forcing a failure. [ 2594.969676][T20322] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.975572][T20318] Call Trace: [ 2594.975582][T20318] [ 2594.994373][T20318] dump_stack_lvl+0xd6/0x122 [ 2594.999041][T20318] dump_stack+0x11/0x1b [ 2595.003248][T20318] should_fail+0x23c/0x250 [ 2595.007645][T20318] should_fail_usercopy+0x16/0x20 [ 2595.012929][T20318] _copy_from_iter+0x131/0x990 [ 2595.017693][T20318] ? check_stack_object+0x61/0x70 [ 2595.022704][T20318] ? __virt_addr_valid+0x15a/0x1a0 [ 2595.027864][T20318] ? __check_object_size+0x253/0x310 [ 2595.033132][T20318] netlink_sendmsg+0x5bb/0x840 [ 2595.037901][T20318] ? netlink_getsockopt+0x720/0x720 [ 2595.043125][T20318] ____sys_sendmsg+0x39a/0x510 [ 2595.047928][T20318] __sys_sendmsg+0x195/0x230 [ 2595.052561][T20318] __x64_sys_sendmsg+0x42/0x50 [ 2595.057330][T20318] do_syscall_64+0x44/0xd0 [ 2595.061729][T20318] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2595.067605][T20318] RIP: 0033:0x7f2f40028ae9 [ 2595.071999][T20318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2595.091637][T20318] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2595.100036][T20318] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2595.108007][T20318] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2595.115965][T20318] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2595.123923][T20318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2595.131881][T20318] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2595.139849][T20318] 03:35:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 6) [ 2595.142856][T20322] CPU: 1 PID: 20322 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2595.153092][T20322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2595.163137][T20322] Call Trace: [ 2595.166436][T20322] [ 2595.169508][T20322] dump_stack_lvl+0xd6/0x122 [ 2595.174078][T20322] dump_stack+0x11/0x1b [ 2595.178209][T20322] should_fail+0x23c/0x250 [ 2595.182618][T20322] __should_failslab+0x81/0x90 [ 2595.187357][T20322] should_failslab+0x5/0x20 [ 2595.192005][T20322] kmem_cache_alloc_node_trace+0x61/0x310 [ 2595.197706][T20322] ? __kmalloc_node_track_caller+0x30/0x40 [ 2595.203649][T20322] __kmalloc_node_track_caller+0x30/0x40 [ 2595.209521][T20322] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2595.214996][T20322] __alloc_skb+0x19d/0x450 [ 2595.219475][T20322] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2595.224755][T20322] rtmsg_ifinfo+0x58/0xc0 [ 2595.229064][T20322] netdev_state_change+0x115/0x170 [ 2595.234170][T20322] do_setlink+0x24a/0x2410 [ 2595.238584][T20322] ? __nla_validate_parse+0x108f/0x1760 [ 2595.244261][T20322] ? __nla_parse+0x3c/0x50 [ 2595.248676][T20322] rtnl_newlink+0xb10/0x13b0 [ 2595.253257][T20322] ? __rcu_read_unlock+0x5c/0x290 [ 2595.258257][T20322] ? rtnl_setlink+0x2a0/0x2a0 [ 2595.262957][T20322] rtnetlink_rcv_msg+0x745/0x7e0 [ 2595.267877][T20322] ? ___cache_free+0x46/0x300 [ 2595.272616][T20322] ? kmem_cache_free+0x65/0x110 [ 2595.278031][T20322] ? __kfree_skb+0xfe/0x150 [ 2595.282519][T20322] ? consume_skb+0x48/0x160 [ 2595.287059][T20322] ? nlmon_xmit+0x5f/0x70 [ 2595.291430][T20322] ? __this_cpu_preempt_check+0x18/0x20 [ 2595.297038][T20322] ? __local_bh_enable_ip+0x4d/0x70 [ 2595.302229][T20322] ? local_bh_enable+0x1b/0x20 [ 2595.307030][T20322] ? __dev_queue_xmit+0x597/0xf70 [ 2595.312046][T20322] ? __skb_clone+0x2db/0x300 [ 2595.316619][T20322] ? __rcu_read_unlock+0x5c/0x290 [ 2595.321670][T20322] netlink_rcv_skb+0x14e/0x250 [ 2595.326418][T20322] ? rtnetlink_bind+0x60/0x60 [ 2595.331149][T20322] rtnetlink_rcv+0x18/0x20 [ 2595.335628][T20322] netlink_unicast+0x5fc/0x6c0 [ 2595.340375][T20322] netlink_sendmsg+0x726/0x840 [ 2595.345233][T20322] ? netlink_getsockopt+0x720/0x720 [ 2595.350481][T20322] ____sys_sendmsg+0x39a/0x510 [ 2595.355300][T20322] __sys_sendmsg+0x195/0x230 [ 2595.359902][T20322] __x64_sys_sendmsg+0x42/0x50 [ 2595.364671][T20322] do_syscall_64+0x44/0xd0 [ 2595.369083][T20322] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2595.375034][T20322] RIP: 0033:0x7f3f1b516ae9 [ 2595.379432][T20322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2595.399029][T20322] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2595.407435][T20322] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2595.415391][T20322] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2595.423370][T20322] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2595.431374][T20322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:35:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 31) [ 2595.439358][T20322] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2595.447332][T20322] [ 2595.457775][T20322] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2595.467991][T20322] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0xc000000}]}, 0x28}}, 0x0) 03:35:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000800)={{0x1, 0x1, 0x18, r1, {0xee00}}, './file0/file0\x00'}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000000206010100000000000000000c000001090002007182902e00000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000900)={0x158, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x28, 0xb, 0x0, 0x1, [@CTA_SEQ_ADJ_REPLY={0x24, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x1}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x101}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x5}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0x114, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x8c, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @empty}}]}, @CTA_TUPLE_REPLY={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x6, 0x0]}, @CTA_TUPLE_MASTER={0x2c, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x1e}}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @multicast1}}}]}]}]}, 0x158}}, 0x800) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='./file0\x00') umount2(0x0, 0x4) sendmsg$nl_netfilter(r1, &(0x7f00000007c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x48, 0x0, 0x9, 0x801, 0x70bd2a, 0x25dfdbfc, {0x3, 0x0, 0x6}, [@generic="6fbdcc1deadd0dbf0d8417149683a9daefeb76619e374c23fcd88c964684b627843980a60b8e44e8f3a7414df2b3b741", @typed={0x4, 0x70}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2595.553844][T20324] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2595.570230][T20324] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x21000000) [ 2595.629270][T18864] ================================================================== [ 2595.637357][T18864] BUG: KCSAN: data-race in ext4_mb_regular_allocator / mb_mark_used [ 2595.645479][T18864] [ 2595.647782][T18864] write to 0xffff8881013bcb54 of 4 bytes by task 22855 on cpu 0: [ 2595.655479][T18864] mb_mark_used+0x13b/0xc50 [ 2595.659963][T18864] ext4_mb_use_best_found+0x102/0x300 [ 2595.665325][T18864] ext4_mb_complex_scan_group+0x359/0x880 [ 2595.671028][T18864] ext4_mb_regular_allocator+0x19c8/0x24a0 [ 2595.676815][T18864] ext4_mb_new_blocks+0x78c/0x1ee0 [ 2595.681906][T18864] ext4_ext_map_blocks+0x1658/0x2120 [ 2595.687182][T18864] ext4_map_blocks+0x71e/0xf00 [ 2595.691923][T18864] ext4_getblk+0xc6/0x3e0 [ 2595.696241][T18864] ext4_bread+0x28/0x100 [ 2595.700521][T18864] ext4_append+0xd1/0x1c0 [ 2595.704862][T18864] ext4_init_new_dir+0x177/0x500 [ 2595.709774][T18864] ext4_mkdir+0x329/0x760 [ 2595.714078][T18864] vfs_mkdir+0x2c8/0x3d0 [ 2595.718298][T18864] do_mkdirat+0x12e/0x2c0 [ 2595.722604][T18864] __x64_sys_mkdir+0x40/0x50 [ 2595.727167][T18864] do_syscall_64+0x44/0xd0 [ 2595.731562][T18864] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2595.737554][T18864] [ 2595.739856][T18864] read to 0xffff8881013bcb54 of 4 bytes by task 18864 on cpu 1: [ 2595.747459][T18864] ext4_mb_regular_allocator+0xa97/0x24a0 [ 2595.753159][T18864] ext4_mb_new_blocks+0x78c/0x1ee0 [ 2595.758249][T18864] ext4_ext_map_blocks+0x1658/0x2120 [ 2595.763511][T18864] ext4_map_blocks+0x71e/0xf00 [ 2595.768258][T18864] ext4_getblk+0xc6/0x3e0 [ 2595.772574][T18864] ext4_bread+0x28/0x100 [ 2595.776793][T18864] ext4_append+0xd1/0x1c0 [ 2595.781095][T18864] ext4_init_new_dir+0x177/0x500 [ 2595.786006][T18864] ext4_mkdir+0x329/0x760 [ 2595.790312][T18864] vfs_mkdir+0x2c8/0x3d0 [ 2595.794543][T18864] do_mkdirat+0x12e/0x2c0 [ 2595.798947][T18864] __x64_sys_mkdir+0x40/0x50 [ 2595.803694][T18864] do_syscall_64+0x44/0xd0 [ 2595.808086][T18864] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2595.813954][T18864] [ 2595.816254][T18864] value changed: 0x000007ee -> 0x000007ed [ 2595.821965][T18864] [ 2595.824262][T18864] Reported by Kernel Concurrency Sanitizer on: 03:35:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x5451, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2595.830407][T18864] CPU: 1 PID: 18864 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2595.840527][T18864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2595.850567][T18864] ================================================================== [ 2595.910794][T20335] FAULT_INJECTION: forcing a failure. [ 2595.910794][T20335] name failslab, interval 1, probability 0, space 0, times 0 [ 2595.923462][T20335] CPU: 0 PID: 20335 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2595.933601][T20335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2595.943654][T20335] Call Trace: [ 2595.946552][T20337] FAULT_INJECTION: forcing a failure. [ 2595.946552][T20337] name failslab, interval 1, probability 0, space 0, times 0 [ 2595.946967][T20335] [ 2595.962444][T20335] dump_stack_lvl+0xd6/0x122 [ 2595.967029][T20335] dump_stack+0x11/0x1b [ 2595.971172][T20335] should_fail+0x23c/0x250 [ 2595.975638][T20335] ? skb_clone+0x12c/0x1f0 [ 2595.980165][T20335] __should_failslab+0x81/0x90 [ 2595.985066][T20335] should_failslab+0x5/0x20 [ 2595.989606][T20335] kmem_cache_alloc+0x4f/0x320 [ 2595.994422][T20335] skb_clone+0x12c/0x1f0 [ 2595.998713][T20335] netlink_deliver_tap+0x2da/0x510 [ 2596.003843][T20335] netlink_unicast+0x5de/0x6c0 [ 2596.008596][T20335] netlink_sendmsg+0x726/0x840 [ 2596.013355][T20335] ? netlink_getsockopt+0x720/0x720 [ 2596.018544][T20335] ____sys_sendmsg+0x39a/0x510 [ 2596.023424][T20335] __sys_sendmsg+0x195/0x230 [ 2596.028008][T20335] __x64_sys_sendmsg+0x42/0x50 [ 2596.032768][T20335] do_syscall_64+0x44/0xd0 [ 2596.037250][T20335] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2596.043214][T20335] RIP: 0033:0x7f2f40028ae9 [ 2596.047621][T20335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2596.067212][T20335] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2596.075640][T20335] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2596.083600][T20335] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2596.091566][T20335] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2596.099606][T20335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2596.107652][T20335] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2596.115628][T20335] [ 2596.118714][T20337] CPU: 1 PID: 20337 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2596.128951][T20337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2596.138985][T20337] Call Trace: [ 2596.142246][T20337] [ 2596.145155][T20337] dump_stack_lvl+0xd6/0x122 [ 2596.149846][T20337] dump_stack+0x11/0x1b [ 2596.154071][T20337] should_fail+0x23c/0x250 [ 2596.158505][T20337] __should_failslab+0x81/0x90 [ 2596.163252][T20337] should_failslab+0x5/0x20 [ 2596.167860][T20337] kmem_cache_alloc_node_trace+0x61/0x310 [ 2596.173602][T20337] ? __kmalloc_node_track_caller+0x30/0x40 [ 2596.179384][T20337] __kmalloc_node_track_caller+0x30/0x40 [ 2596.185005][T20337] ? netlink_trim+0x112/0x140 [ 2596.189713][T20337] pskb_expand_head+0xca/0x8b0 [ 2596.194527][T20337] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2596.199722][T20337] netlink_trim+0x112/0x140 [ 2596.204252][T20337] netlink_broadcast+0x42/0xad0 [ 2596.209087][T20337] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2596.214524][T20337] nlmsg_notify+0xc7/0x170 [ 2596.219060][T20337] rtmsg_ifinfo+0xa4/0xc0 [ 2596.223417][T20337] netdev_state_change+0x115/0x170 [ 2596.228534][T20337] do_setlink+0x24a/0x2410 [ 2596.232946][T20337] ? __nla_validate_parse+0x108f/0x1760 [ 2596.238685][T20337] ? __nla_parse+0x3c/0x50 [ 2596.243169][T20337] rtnl_newlink+0xb10/0x13b0 [ 2596.247924][T20337] ? __rcu_read_unlock+0x5c/0x290 [ 2596.252957][T20337] ? rtnl_setlink+0x2a0/0x2a0 [ 2596.257613][T20337] rtnetlink_rcv_msg+0x745/0x7e0 [ 2596.262608][T20337] ? ___cache_free+0x46/0x300 [ 2596.267265][T20337] ? kmem_cache_free+0x65/0x110 [ 2596.272124][T20337] ? __kfree_skb+0xfe/0x150 [ 2596.276674][T20337] ? consume_skb+0x48/0x160 [ 2596.281210][T20337] ? nlmon_xmit+0x5f/0x70 [ 2596.285516][T20337] ? __this_cpu_preempt_check+0x18/0x20 [ 2596.291109][T20337] ? __local_bh_enable_ip+0x4d/0x70 [ 2596.296287][T20337] ? local_bh_enable+0x1b/0x20 [ 2596.301082][T20337] ? __dev_queue_xmit+0x597/0xf70 [ 2596.306084][T20337] ? __skb_clone+0x2db/0x300 [ 2596.310665][T20337] ? __rcu_read_unlock+0x5c/0x290 [ 2596.315676][T20337] netlink_rcv_skb+0x14e/0x250 [ 2596.320421][T20337] ? rtnetlink_bind+0x60/0x60 [ 2596.325145][T20337] rtnetlink_rcv+0x18/0x20 [ 2596.329612][T20337] netlink_unicast+0x5fc/0x6c0 [ 2596.334355][T20337] netlink_sendmsg+0x726/0x840 [ 2596.339111][T20337] ? netlink_getsockopt+0x720/0x720 [ 2596.344348][T20337] ____sys_sendmsg+0x39a/0x510 [ 2596.349197][T20337] __sys_sendmsg+0x195/0x230 [ 2596.353869][T20337] __x64_sys_sendmsg+0x42/0x50 [ 2596.358666][T20337] do_syscall_64+0x44/0xd0 [ 2596.363074][T20337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2596.368986][T20337] RIP: 0033:0x7f3f1b516ae9 [ 2596.373467][T20337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2596.393053][T20337] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2596.401615][T20337] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2596.409625][T20337] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2596.417571][T20337] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2596.425617][T20337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2596.433574][T20337] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2596.441526][T20337] [ 2596.449159][T20337] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 32) 03:35:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 7) [ 2596.459984][T20337] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2596.477939][T20335] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0xf000000}]}, 0x28}}, 0x0) 03:35:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x25000000) 03:35:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) chmod(&(0x7f0000000080)='./file0\x00', 0x10) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x5452, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2596.638342][T20343] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2596.656018][T20344] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.2'. 03:35:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x40000000) [ 2596.736246][T20352] FAULT_INJECTION: forcing a failure. [ 2596.736246][T20352] name failslab, interval 1, probability 0, space 0, times 0 [ 2596.748941][T20352] CPU: 0 PID: 20352 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2596.759090][T20352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2596.769154][T20352] Call Trace: [ 2596.772502][T20352] [ 2596.775427][T20352] dump_stack_lvl+0xd6/0x122 [ 2596.780080][T20352] dump_stack+0x11/0x1b 03:35:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x5460, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2596.784226][T20352] should_fail+0x23c/0x250 [ 2596.788726][T20352] __should_failslab+0x81/0x90 [ 2596.793494][T20352] should_failslab+0x5/0x20 [ 2596.798068][T20352] kmem_cache_alloc_node+0x61/0x2d0 [ 2596.803279][T20352] ? __rcu_read_unlock+0x5c/0x290 [ 2596.808335][T20352] ? fib_sync_up+0x51c/0x550 [ 2596.812991][T20352] ? __alloc_skb+0xf0/0x450 [ 2596.817554][T20352] __alloc_skb+0xf0/0x450 [ 2596.821934][T20352] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2596.827226][T20352] rtmsg_ifinfo+0x58/0xc0 [ 2596.831560][T20352] netdev_state_change+0x115/0x170 03:35:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x48000000) [ 2596.836701][T20352] do_setlink+0x24a/0x2410 [ 2596.841128][T20352] ? __nla_validate_parse+0x108f/0x1760 [ 2596.846666][T20352] ? __nla_parse+0x3c/0x50 [ 2596.851076][T20352] rtnl_newlink+0xb10/0x13b0 [ 2596.855698][T20352] ? __rcu_read_unlock+0x5c/0x290 [ 2596.860731][T20352] ? rtnl_setlink+0x2a0/0x2a0 [ 2596.865487][T20352] rtnetlink_rcv_msg+0x745/0x7e0 [ 2596.870430][T20352] ? ___cache_free+0x46/0x300 [ 2596.875097][T20352] ? kmem_cache_free+0x65/0x110 [ 2596.880027][T20352] ? __kfree_skb+0xfe/0x150 03:35:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8901, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2596.884661][T20352] ? consume_skb+0x48/0x160 [ 2596.889243][T20352] ? nlmon_xmit+0x5f/0x70 [ 2596.893570][T20352] ? __this_cpu_preempt_check+0x18/0x20 [ 2596.899198][T20352] ? __local_bh_enable_ip+0x4d/0x70 [ 2596.904420][T20352] ? local_bh_enable+0x1b/0x20 [ 2596.909315][T20352] ? __dev_queue_xmit+0x597/0xf70 [ 2596.914340][T20352] ? __skb_clone+0x2db/0x300 [ 2596.919094][T20352] ? __rcu_read_unlock+0x5c/0x290 [ 2596.924106][T20352] netlink_rcv_skb+0x14e/0x250 [ 2596.928872][T20352] ? rtnetlink_bind+0x60/0x60 03:35:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x4c000000) [ 2596.933575][T20352] rtnetlink_rcv+0x18/0x20 [ 2596.938040][T20352] netlink_unicast+0x5fc/0x6c0 [ 2596.942890][T20352] netlink_sendmsg+0x726/0x840 [ 2596.947648][T20352] ? netlink_getsockopt+0x720/0x720 [ 2596.952859][T20352] ____sys_sendmsg+0x39a/0x510 [ 2596.957708][T20352] __sys_sendmsg+0x195/0x230 [ 2596.962449][T20352] __x64_sys_sendmsg+0x42/0x50 [ 2596.967287][T20352] do_syscall_64+0x44/0xd0 [ 2596.971699][T20352] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2596.977658][T20352] RIP: 0033:0x7f3f1b516ae9 03:35:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8902, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2596.982124][T20352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2597.001732][T20352] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2597.010129][T20352] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2597.018100][T20352] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2597.026092][T20352] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2597.034051][T20352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2597.042021][T20352] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2597.049995][T20352] [ 2597.056545][T20352] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2597.066858][T20352] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2597.082443][T20353] FAULT_INJECTION: forcing a failure. 03:35:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 33) [ 2597.082443][T20353] name failslab, interval 1, probability 0, space 0, times 0 [ 2597.095128][T20353] CPU: 1 PID: 20353 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2597.105261][T20353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2597.115304][T20353] Call Trace: [ 2597.118570][T20353] [ 2597.121481][T20353] dump_stack_lvl+0xd6/0x122 [ 2597.126087][T20353] dump_stack+0x11/0x1b [ 2597.130237][T20353] should_fail+0x23c/0x250 [ 2597.134626][T20353] ? rtnl_newlink+0x59/0x13b0 [ 2597.139343][T20353] __should_failslab+0x81/0x90 [ 2597.144134][T20353] should_failslab+0x5/0x20 [ 2597.148691][T20353] kmem_cache_alloc_trace+0x52/0x350 [ 2597.153967][T20353] rtnl_newlink+0x59/0x13b0 [ 2597.158485][T20353] ? __rcu_read_unlock+0x5c/0x290 [ 2597.163549][T20353] ? __this_cpu_preempt_check+0x18/0x20 [ 2597.169156][T20353] ? __perf_event_task_sched_in+0x898/0x8d0 [ 2597.175159][T20353] ? __this_cpu_preempt_check+0x18/0x20 [ 2597.180720][T20353] ? xfd_validate_state+0x4e/0xf0 [ 2597.185813][T20353] ? save_fpregs_to_fpstate+0xf5/0x140 [ 2597.191304][T20353] ? _raw_spin_unlock+0x2e/0x50 [ 2597.196140][T20353] ? finish_task_switch+0xd0/0x280 [ 2597.201278][T20353] ? __schedule+0x44a/0x6a0 [ 2597.205814][T20353] ? __list_del_entry_valid+0x54/0xc0 [ 2597.211164][T20353] ? _raw_spin_unlock+0x2e/0x50 [ 2597.215989][T20353] ? __mutex_lock+0x21d/0x5a0 [ 2597.220642][T20353] ? rtnl_setlink+0x2a0/0x2a0 [ 2597.225306][T20353] rtnetlink_rcv_msg+0x745/0x7e0 [ 2597.230268][T20353] ? ___cache_free+0x46/0x300 [ 2597.234923][T20353] ? kmem_cache_free+0x65/0x110 [ 2597.239757][T20353] ? __kfree_skb+0xfe/0x150 [ 2597.244268][T20353] ? consume_skb+0x48/0x160 [ 2597.248751][T20353] ? nlmon_xmit+0x5f/0x70 [ 2597.253085][T20353] ? __this_cpu_preempt_check+0x18/0x20 [ 2597.258688][T20353] ? __local_bh_enable_ip+0x4d/0x70 [ 2597.263877][T20353] ? local_bh_enable+0x1b/0x20 [ 2597.269035][T20353] ? __dev_queue_xmit+0x597/0xf70 [ 2597.274235][T20353] ? __skb_clone+0x2db/0x300 [ 2597.278840][T20353] ? __rcu_read_unlock+0x5c/0x290 [ 2597.283853][T20353] netlink_rcv_skb+0x14e/0x250 [ 2597.288633][T20353] ? rtnetlink_bind+0x60/0x60 [ 2597.293353][T20353] rtnetlink_rcv+0x18/0x20 [ 2597.297745][T20353] netlink_unicast+0x5fc/0x6c0 [ 2597.302600][T20353] netlink_sendmsg+0x726/0x840 [ 2597.307378][T20353] ? netlink_getsockopt+0x720/0x720 [ 2597.312574][T20353] ____sys_sendmsg+0x39a/0x510 [ 2597.317327][T20353] __sys_sendmsg+0x195/0x230 [ 2597.321925][T20353] __x64_sys_sendmsg+0x42/0x50 [ 2597.326695][T20353] do_syscall_64+0x44/0xd0 [ 2597.331091][T20353] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2597.336971][T20353] RIP: 0033:0x7f2f40028ae9 [ 2597.341415][T20353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2597.361130][T20353] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2597.369547][T20353] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2597.377519][T20353] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 03:35:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 8) 03:35:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x68000000) 03:35:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x10000000}]}, 0x28}}, 0x0) [ 2597.385469][T20353] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2597.393426][T20353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2597.401397][T20353] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2597.409416][T20353] 03:35:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8903, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="6e73ee698dffc58860a82d00"], &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000000207010100000000000000000c0073797a3100"/32], 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x1}}, './file0\x00'}) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xb4, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x30, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x2c, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @rand_addr=0x64010102}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0x68, 0xb, 0x0, 0x1, [@CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x1}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x40000800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xb4}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 2597.604578][T20375] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2597.616744][T20379] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2597.655363][T20382] FAULT_INJECTION: forcing a failure. [ 2597.655363][T20382] name failslab, interval 1, probability 0, space 0, times 0 [ 2597.668072][T20382] CPU: 1 PID: 20382 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2597.678249][T20382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2597.688385][T20382] Call Trace: [ 2597.691665][T20382] [ 2597.694574][T20382] dump_stack_lvl+0xd6/0x122 [ 2597.699225][T20382] dump_stack+0x11/0x1b [ 2597.703508][T20382] should_fail+0x23c/0x250 [ 2597.707939][T20382] __should_failslab+0x81/0x90 [ 2597.712694][T20382] should_failslab+0x5/0x20 [ 2597.717229][T20382] kmem_cache_alloc_node_trace+0x61/0x310 [ 2597.722950][T20382] ? __kmalloc_node_track_caller+0x30/0x40 [ 2597.728747][T20382] __kmalloc_node_track_caller+0x30/0x40 [ 2597.734383][T20382] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2597.739969][T20382] __alloc_skb+0x19d/0x450 [ 2597.744435][T20382] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2597.749701][T20382] rtmsg_ifinfo+0x58/0xc0 [ 2597.754090][T20382] netdev_state_change+0x115/0x170 [ 2597.759242][T20382] do_setlink+0x24a/0x2410 [ 2597.763646][T20382] ? __nla_validate_parse+0x108f/0x1760 [ 2597.769232][T20382] ? __nla_parse+0x3c/0x50 [ 2597.773622][T20382] rtnl_newlink+0xb10/0x13b0 [ 2597.778275][T20382] ? __rcu_read_unlock+0x5c/0x290 [ 2597.783292][T20382] ? rtnl_setlink+0x2a0/0x2a0 [ 2597.788012][T20382] rtnetlink_rcv_msg+0x745/0x7e0 [ 2597.792985][T20382] ? ___cache_free+0x46/0x300 [ 2597.797722][T20382] ? kmem_cache_free+0x65/0x110 [ 2597.802635][T20382] ? __kfree_skb+0xfe/0x150 [ 2597.807140][T20382] ? consume_skb+0x48/0x160 [ 2597.811690][T20382] ? nlmon_xmit+0x5f/0x70 [ 2597.816161][T20382] ? __this_cpu_preempt_check+0x18/0x20 [ 2597.821692][T20382] ? __local_bh_enable_ip+0x4d/0x70 [ 2597.826870][T20382] ? local_bh_enable+0x1b/0x20 [ 2597.831651][T20382] ? __dev_queue_xmit+0x597/0xf70 [ 2597.836677][T20382] ? __skb_clone+0x2db/0x300 [ 2597.841364][T20382] ? __rcu_read_unlock+0x5c/0x290 [ 2597.846386][T20382] netlink_rcv_skb+0x14e/0x250 [ 2597.851152][T20382] ? rtnetlink_bind+0x60/0x60 [ 2597.855950][T20382] rtnetlink_rcv+0x18/0x20 [ 2597.860355][T20382] netlink_unicast+0x5fc/0x6c0 [ 2597.865113][T20382] netlink_sendmsg+0x726/0x840 [ 2597.869865][T20382] ? netlink_getsockopt+0x720/0x720 [ 2597.875153][T20382] ____sys_sendmsg+0x39a/0x510 [ 2597.879953][T20382] __sys_sendmsg+0x195/0x230 [ 2597.884609][T20382] __x64_sys_sendmsg+0x42/0x50 [ 2597.889357][T20382] do_syscall_64+0x44/0xd0 [ 2597.893829][T20382] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2597.899776][T20382] RIP: 0033:0x7f3f1b516ae9 [ 2597.904282][T20382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2597.923903][T20382] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2597.932333][T20382] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2597.940292][T20382] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2597.948254][T20382] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 03:35:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x6c000000) 03:35:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x21000000}]}, 0x28}}, 0x0) 03:35:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 34) [ 2597.956210][T20382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2597.964162][T20382] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2597.972210][T20382] [ 2597.980375][T20382] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2597.990633][T20382] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2598.044171][T20385] FAULT_INJECTION: forcing a failure. [ 2598.044171][T20385] name failslab, interval 1, probability 0, space 0, times 0 [ 2598.056833][T20385] CPU: 1 PID: 20385 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2598.066989][T20385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2598.077117][T20385] Call Trace: [ 2598.080377][T20385] [ 2598.083898][T20385] dump_stack_lvl+0xd6/0x122 [ 2598.088542][T20385] dump_stack+0x11/0x1b [ 2598.092691][T20385] should_fail+0x23c/0x250 [ 2598.097082][T20385] __should_failslab+0x81/0x90 [ 2598.101826][T20385] should_failslab+0x5/0x20 [ 2598.106402][T20385] kmem_cache_alloc_node+0x61/0x2d0 [ 2598.111635][T20385] ? __rcu_read_unlock+0x5c/0x290 [ 2598.116663][T20385] ? fib_sync_up+0x51c/0x550 [ 2598.121289][T20385] ? __alloc_skb+0xf0/0x450 [ 2598.125794][T20385] __alloc_skb+0xf0/0x450 [ 2598.130112][T20385] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2598.135459][T20385] rtmsg_ifinfo+0x58/0xc0 [ 2598.139767][T20385] netdev_state_change+0x115/0x170 [ 2598.144860][T20385] do_setlink+0x24a/0x2410 [ 2598.149348][T20385] ? __nla_validate_parse+0x108f/0x1760 [ 2598.154979][T20385] ? __nla_parse+0x3c/0x50 [ 2598.159372][T20385] rtnl_newlink+0xb10/0x13b0 [ 2598.164003][T20385] ? __rcu_read_unlock+0x5c/0x290 [ 2598.169112][T20385] ? rtnl_setlink+0x2a0/0x2a0 [ 2598.173788][T20385] rtnetlink_rcv_msg+0x745/0x7e0 [ 2598.178730][T20385] ? ___cache_free+0x46/0x300 [ 2598.183386][T20385] ? kmem_cache_free+0x65/0x110 [ 2598.188275][T20385] ? __kfree_skb+0xfe/0x150 [ 2598.192817][T20385] ? consume_skb+0x48/0x160 [ 2598.197297][T20385] ? nlmon_xmit+0x5f/0x70 [ 2598.201684][T20385] ? __this_cpu_preempt_check+0x18/0x20 [ 2598.207342][T20385] ? __local_bh_enable_ip+0x4d/0x70 [ 2598.212577][T20385] ? local_bh_enable+0x1b/0x20 [ 2598.217383][T20385] ? __dev_queue_xmit+0x597/0xf70 [ 2598.222381][T20385] ? __skb_clone+0x2db/0x300 [ 2598.226950][T20385] ? __rcu_read_unlock+0x5c/0x290 [ 2598.232262][T20385] netlink_rcv_skb+0x14e/0x250 [ 2598.237021][T20385] ? rtnetlink_bind+0x60/0x60 [ 2598.241753][T20385] rtnetlink_rcv+0x18/0x20 [ 2598.246304][T20385] netlink_unicast+0x5fc/0x6c0 [ 2598.251735][T20385] netlink_sendmsg+0x726/0x840 [ 2598.256506][T20385] ? netlink_getsockopt+0x720/0x720 [ 2598.261683][T20385] ____sys_sendmsg+0x39a/0x510 [ 2598.266554][T20385] __sys_sendmsg+0x195/0x230 [ 2598.271141][T20385] __x64_sys_sendmsg+0x42/0x50 [ 2598.275905][T20385] do_syscall_64+0x44/0xd0 [ 2598.280398][T20385] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2598.286270][T20385] RIP: 0033:0x7f2f40028ae9 [ 2598.290702][T20385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2598.310283][T20385] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2598.318675][T20385] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2598.326624][T20385] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2598.334592][T20385] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 03:35:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 9) [ 2598.342945][T20385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2598.350900][T20385] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2598.358978][T20385] [ 2598.366221][T20385] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8904, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x60000000}]}, 0x28}}, 0x0) 03:35:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x74000000) 03:35:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="300000000100e37cc02da6bd96d70000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) [ 2598.547567][T20398] FAULT_INJECTION: forcing a failure. [ 2598.547567][T20398] name failslab, interval 1, probability 0, space 0, times 0 [ 2598.560348][T20398] CPU: 1 PID: 20398 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2598.571275][T20398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2598.581412][T20398] Call Trace: [ 2598.584711][T20398] [ 2598.587622][T20398] dump_stack_lvl+0xd6/0x122 [ 2598.592193][T20398] dump_stack+0x11/0x1b [ 2598.596393][T20398] should_fail+0x23c/0x250 [ 2598.600885][T20398] __should_failslab+0x81/0x90 [ 2598.605627][T20398] should_failslab+0x5/0x20 [ 2598.610110][T20398] kmem_cache_alloc_node_trace+0x61/0x310 [ 2598.615806][T20398] ? __kmalloc_node_track_caller+0x30/0x40 [ 2598.621592][T20398] __kmalloc_node_track_caller+0x30/0x40 [ 2598.627241][T20398] ? netlink_trim+0x112/0x140 [ 2598.632172][T20398] pskb_expand_head+0xca/0x8b0 [ 2598.636956][T20398] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2598.642151][T20398] netlink_trim+0x112/0x140 [ 2598.646645][T20398] netlink_broadcast+0x42/0xad0 [ 2598.651493][T20398] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2598.656945][T20398] nlmsg_notify+0xc7/0x170 [ 2598.661398][T20398] rtmsg_ifinfo+0xa4/0xc0 [ 2598.666518][T20398] netdev_state_change+0x115/0x170 [ 2598.671756][T20398] do_setlink+0x24a/0x2410 [ 2598.676155][T20398] ? __nla_validate_parse+0x108f/0x1760 [ 2598.681708][T20398] ? __nla_parse+0x3c/0x50 [ 2598.686129][T20398] rtnl_newlink+0xb10/0x13b0 [ 2598.690724][T20398] ? __rcu_read_unlock+0x5c/0x290 [ 2598.695847][T20398] ? rtnl_setlink+0x2a0/0x2a0 [ 2598.700531][T20398] rtnetlink_rcv_msg+0x745/0x7e0 [ 2598.705523][T20398] ? ___cache_free+0x46/0x300 [ 2598.710296][T20398] ? kmem_cache_free+0x65/0x110 [ 2598.715173][T20398] ? __kfree_skb+0xfe/0x150 [ 2598.719742][T20398] ? consume_skb+0x48/0x160 [ 2598.724234][T20398] ? nlmon_xmit+0x5f/0x70 [ 2598.728566][T20398] ? __this_cpu_preempt_check+0x18/0x20 [ 2598.734168][T20398] ? __local_bh_enable_ip+0x4d/0x70 [ 2598.739345][T20398] ? local_bh_enable+0x1b/0x20 [ 2598.744091][T20398] ? __dev_queue_xmit+0x597/0xf70 [ 2598.749092][T20398] ? __skb_clone+0x2db/0x300 [ 2598.753682][T20398] ? __rcu_read_unlock+0x5c/0x290 [ 2598.758695][T20398] netlink_rcv_skb+0x14e/0x250 [ 2598.763460][T20398] ? rtnetlink_bind+0x60/0x60 [ 2598.768190][T20398] rtnetlink_rcv+0x18/0x20 [ 2598.772584][T20398] netlink_unicast+0x5fc/0x6c0 [ 2598.777397][T20398] netlink_sendmsg+0x726/0x840 [ 2598.782200][T20398] ? netlink_getsockopt+0x720/0x720 [ 2598.787426][T20398] ____sys_sendmsg+0x39a/0x510 [ 2598.792184][T20398] __sys_sendmsg+0x195/0x230 [ 2598.805479][T20398] __x64_sys_sendmsg+0x42/0x50 [ 2598.810240][T20398] do_syscall_64+0x44/0xd0 [ 2598.814644][T20398] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2598.820517][T20398] RIP: 0033:0x7f3f1b516ae9 [ 2598.824920][T20398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2598.844505][T20398] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2598.852943][T20398] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2598.861071][T20398] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2598.869104][T20398] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2598.877142][T20398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2598.885130][T20398] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2598.893172][T20398] 03:35:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 35) [ 2598.900101][T20398] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2598.910298][T20398] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2598.928615][T20399] FAULT_INJECTION: forcing a failure. [ 2598.928615][T20399] name failslab, interval 1, probability 0, space 0, times 0 [ 2598.941267][T20399] CPU: 0 PID: 20399 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2598.951464][T20399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2598.961516][T20399] Call Trace: [ 2598.964864][T20399] [ 2598.967781][T20399] dump_stack_lvl+0xd6/0x122 [ 2598.972497][T20399] dump_stack+0x11/0x1b [ 2598.976631][T20399] should_fail+0x23c/0x250 [ 2598.981024][T20399] __should_failslab+0x81/0x90 [ 2598.985809][T20399] should_failslab+0x5/0x20 [ 2598.990346][T20399] kmem_cache_alloc_node_trace+0x61/0x310 [ 2598.996132][T20399] ? __kmalloc_node_track_caller+0x30/0x40 [ 2599.001993][T20399] __kmalloc_node_track_caller+0x30/0x40 [ 2599.007695][T20399] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2599.013183][T20399] __alloc_skb+0x19d/0x450 [ 2599.017659][T20399] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2599.022932][T20399] rtmsg_ifinfo+0x58/0xc0 [ 2599.027268][T20399] netdev_state_change+0x115/0x170 [ 2599.032433][T20399] do_setlink+0x24a/0x2410 [ 2599.036859][T20399] ? __nla_validate_parse+0x108f/0x1760 [ 2599.042408][T20399] ? __nla_parse+0x3c/0x50 [ 2599.046846][T20399] rtnl_newlink+0xb10/0x13b0 03:35:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8906, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2599.051482][T20399] ? __rcu_read_unlock+0x5c/0x290 [ 2599.056491][T20399] ? rtnl_setlink+0x2a0/0x2a0 [ 2599.061155][T20399] rtnetlink_rcv_msg+0x745/0x7e0 [ 2599.066112][T20399] ? ___cache_free+0x46/0x300 [ 2599.070835][T20399] ? kmem_cache_free+0x65/0x110 [ 2599.075688][T20399] ? __kfree_skb+0xfe/0x150 [ 2599.080205][T20399] ? consume_skb+0x48/0x160 [ 2599.084761][T20399] ? nlmon_xmit+0x5f/0x70 [ 2599.089182][T20399] ? __this_cpu_preempt_check+0x18/0x20 [ 2599.094871][T20399] ? __local_bh_enable_ip+0x4d/0x70 03:35:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x7a000000) [ 2599.100095][T20399] ? local_bh_enable+0x1b/0x20 [ 2599.104905][T20399] ? __dev_queue_xmit+0x597/0xf70 [ 2599.109925][T20399] ? __skb_clone+0x2db/0x300 [ 2599.114589][T20399] ? __rcu_read_unlock+0x5c/0x290 [ 2599.119609][T20399] netlink_rcv_skb+0x14e/0x250 [ 2599.124375][T20399] ? rtnetlink_bind+0x60/0x60 [ 2599.129049][T20399] rtnetlink_rcv+0x18/0x20 [ 2599.133525][T20399] netlink_unicast+0x5fc/0x6c0 [ 2599.138355][T20399] netlink_sendmsg+0x726/0x840 [ 2599.143129][T20399] ? netlink_getsockopt+0x720/0x720 [ 2599.148327][T20399] ____sys_sendmsg+0x39a/0x510 [ 2599.153108][T20399] __sys_sendmsg+0x195/0x230 [ 2599.157696][T20399] __x64_sys_sendmsg+0x42/0x50 [ 2599.162488][T20399] do_syscall_64+0x44/0xd0 [ 2599.167043][T20399] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2599.172933][T20399] RIP: 0033:0x7f2f40028ae9 [ 2599.177387][T20399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 03:35:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8907, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x7fffe000) [ 2599.196990][T20399] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2599.205385][T20399] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2599.213353][T20399] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2599.221323][T20399] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2599.229280][T20399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2599.237234][T20399] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2599.245315][T20399] 03:35:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x65580000}]}, 0x28}}, 0x0) 03:35:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 10) [ 2599.253524][T20399] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2599.267709][T20408] FAULT_INJECTION: forcing a failure. [ 2599.267709][T20408] name failslab, interval 1, probability 0, space 0, times 0 [ 2599.280486][T20408] CPU: 1 PID: 20408 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2599.290634][T20408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2599.300673][T20408] Call Trace: [ 2599.303947][T20408] [ 2599.306866][T20408] dump_stack_lvl+0xd6/0x122 [ 2599.311465][T20408] dump_stack+0x11/0x1b [ 2599.315599][T20408] should_fail+0x23c/0x250 [ 2599.320043][T20408] __should_failslab+0x81/0x90 [ 2599.324805][T20408] should_failslab+0x5/0x20 [ 2599.329317][T20408] kmem_cache_alloc_node+0x61/0x2d0 [ 2599.334507][T20408] ? __rcu_read_unlock+0x5c/0x290 [ 2599.339571][T20408] ? fib_sync_up+0x51c/0x550 [ 2599.344138][T20408] ? __alloc_skb+0xf0/0x450 [ 2599.348623][T20408] __alloc_skb+0xf0/0x450 [ 2599.352967][T20408] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2599.358256][T20408] rtmsg_ifinfo+0x58/0xc0 [ 2599.362574][T20408] netdev_state_change+0x115/0x170 [ 2599.367708][T20408] do_setlink+0x24a/0x2410 [ 2599.372137][T20408] ? __nla_validate_parse+0x108f/0x1760 [ 2599.377667][T20408] ? __nla_parse+0x3c/0x50 [ 2599.382063][T20408] rtnl_newlink+0xb10/0x13b0 [ 2599.386638][T20408] ? rtnl_setlink+0x2a0/0x2a0 [ 2599.391357][T20408] rtnetlink_rcv_msg+0x745/0x7e0 [ 2599.396342][T20408] ? ___cache_free+0x46/0x300 [ 2599.401307][T20408] ? kmem_cache_free+0x65/0x110 [ 2599.406184][T20408] ? __kfree_skb+0xfe/0x150 [ 2599.410780][T20408] ? consume_skb+0x48/0x160 [ 2599.415260][T20408] ? nlmon_xmit+0x5f/0x70 [ 2599.419617][T20408] ? __this_cpu_preempt_check+0x18/0x20 [ 2599.425184][T20408] ? __local_bh_enable_ip+0x4d/0x70 [ 2599.430453][T20408] ? local_bh_enable+0x1b/0x20 [ 2599.435265][T20408] ? __dev_queue_xmit+0x597/0xf70 [ 2599.440367][T20408] ? __skb_clone+0x2db/0x300 [ 2599.444937][T20408] ? __rcu_read_unlock+0x5c/0x290 [ 2599.450037][T20408] netlink_rcv_skb+0x14e/0x250 [ 2599.454838][T20408] ? rtnetlink_bind+0x60/0x60 [ 2599.459525][T20408] rtnetlink_rcv+0x18/0x20 [ 2599.463918][T20408] netlink_unicast+0x5fc/0x6c0 [ 2599.468681][T20408] netlink_sendmsg+0x726/0x840 [ 2599.473510][T20408] ? netlink_getsockopt+0x720/0x720 [ 2599.478685][T20408] ____sys_sendmsg+0x39a/0x510 [ 2599.483478][T20408] __sys_sendmsg+0x195/0x230 [ 2599.488073][T20408] __x64_sys_sendmsg+0x42/0x50 [ 2599.492923][T20408] do_syscall_64+0x44/0xd0 [ 2599.497390][T20408] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2599.503378][T20408] RIP: 0033:0x7f3f1b516ae9 [ 2599.507779][T20408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2599.527468][T20408] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2599.535944][T20408] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2599.543939][T20408] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2599.551893][T20408] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2599.559897][T20408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2599.567851][T20408] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2599.576002][T20408] [ 2599.586048][T20408] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 36) [ 2599.596281][T20408] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8912, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0xffffffff) [ 2599.768282][T20419] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2599.778402][T20419] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=20419 comm=syz-executor.2 [ 2599.793698][T20424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=20424 comm=syz-executor.2 [ 2599.822152][T20426] FAULT_INJECTION: forcing a failure. [ 2599.822152][T20426] name failslab, interval 1, probability 0, space 0, times 0 [ 2599.834929][T20426] CPU: 1 PID: 20426 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2599.845205][T20426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2599.855269][T20426] Call Trace: [ 2599.858597][T20426] [ 2599.861586][T20426] dump_stack_lvl+0xd6/0x122 [ 2599.866274][T20426] dump_stack+0x11/0x1b [ 2599.870526][T20426] should_fail+0x23c/0x250 [ 2599.875040][T20426] __should_failslab+0x81/0x90 [ 2599.879872][T20426] should_failslab+0x5/0x20 [ 2599.884383][T20426] kmem_cache_alloc_node_trace+0x61/0x310 [ 2599.890222][T20426] ? __kmalloc_node_track_caller+0x30/0x40 [ 2599.896122][T20426] __kmalloc_node_track_caller+0x30/0x40 [ 2599.901803][T20426] ? netlink_trim+0x112/0x140 [ 2599.906579][T20426] pskb_expand_head+0xca/0x8b0 [ 2599.911358][T20426] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2599.916562][T20426] netlink_trim+0x112/0x140 [ 2599.921073][T20426] netlink_broadcast+0x42/0xad0 [ 2599.925943][T20426] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2599.931409][T20426] nlmsg_notify+0xc7/0x170 [ 2599.936005][T20426] rtmsg_ifinfo+0xa4/0xc0 [ 2599.940338][T20426] netdev_state_change+0x115/0x170 [ 2599.945459][T20426] do_setlink+0x24a/0x2410 [ 2599.949886][T20426] ? __nla_validate_parse+0x108f/0x1760 [ 2599.955478][T20426] ? __nla_parse+0x3c/0x50 [ 2599.959891][T20426] rtnl_newlink+0xb10/0x13b0 [ 2599.964552][T20426] ? __rcu_read_unlock+0x5c/0x290 [ 2599.969668][T20426] ? rtnl_setlink+0x2a0/0x2a0 [ 2599.974391][T20426] rtnetlink_rcv_msg+0x745/0x7e0 [ 2599.979358][T20426] ? ___cache_free+0x46/0x300 [ 2599.984299][T20426] ? kmem_cache_free+0x65/0x110 [ 2599.989149][T20426] ? __kfree_skb+0xfe/0x150 [ 2599.993769][T20426] ? consume_skb+0x48/0x160 [ 2599.998270][T20426] ? nlmon_xmit+0x5f/0x70 [ 2600.002616][T20426] ? __this_cpu_preempt_check+0x18/0x20 [ 2600.008264][T20426] ? __local_bh_enable_ip+0x4d/0x70 [ 2600.013520][T20426] ? local_bh_enable+0x1b/0x20 [ 2600.018345][T20426] ? __dev_queue_xmit+0x597/0xf70 [ 2600.023395][T20426] ? __skb_clone+0x2db/0x300 [ 2600.027990][T20426] ? __rcu_read_unlock+0x5c/0x290 [ 2600.033019][T20426] netlink_rcv_skb+0x14e/0x250 [ 2600.037789][T20426] ? rtnetlink_bind+0x60/0x60 [ 2600.042478][T20426] rtnetlink_rcv+0x18/0x20 [ 2600.046968][T20426] netlink_unicast+0x5fc/0x6c0 [ 2600.051741][T20426] netlink_sendmsg+0x726/0x840 [ 2600.056573][T20426] ? netlink_getsockopt+0x720/0x720 [ 2600.061828][T20426] ____sys_sendmsg+0x39a/0x510 [ 2600.066692][T20426] __sys_sendmsg+0x195/0x230 [ 2600.071295][T20426] __x64_sys_sendmsg+0x42/0x50 [ 2600.076140][T20426] do_syscall_64+0x44/0xd0 [ 2600.080598][T20426] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2600.086496][T20426] RIP: 0033:0x7f2f40028ae9 [ 2600.090903][T20426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2600.110605][T20426] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 03:35:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="6f73cb4f2b66a8ddc75db8f4a69e82a086d5cacefa87f1448d045e5b135fbd75c4b4adde28e6c3be3edd64919a5bb9"], &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r0, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x8, 0x103) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={r1, 0x8, 0x10, 0x200, 0x200}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080), 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000340)={0x4, 0x6, 0x201, 0xc7b5795, 0x1f7, 0x2, 0x673, 0x100, r1}, &(0x7f0000000500)=0x20) [ 2600.119041][T20426] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2600.127010][T20426] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2600.134982][T20426] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2600.142959][T20426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2600.151088][T20426] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2600.159066][T20426] 03:35:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x81000000}]}, 0x28}}, 0x0) 03:35:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 11) [ 2600.175093][T20426] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2600.219588][T20428] FAULT_INJECTION: forcing a failure. [ 2600.219588][T20428] name failslab, interval 1, probability 0, space 0, times 0 [ 2600.232282][T20428] CPU: 0 PID: 20428 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2600.242433][T20428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2600.252488][T20428] Call Trace: [ 2600.255769][T20428] [ 2600.258749][T20428] dump_stack_lvl+0xd6/0x122 [ 2600.263345][T20428] dump_stack+0x11/0x1b [ 2600.267504][T20428] should_fail+0x23c/0x250 [ 2600.272013][T20428] __should_failslab+0x81/0x90 [ 2600.276782][T20428] should_failslab+0x5/0x20 [ 2600.281367][T20428] kmem_cache_alloc_node_trace+0x61/0x310 [ 2600.287093][T20428] ? __kmalloc_node_track_caller+0x30/0x40 [ 2600.292965][T20428] __kmalloc_node_track_caller+0x30/0x40 [ 2600.298602][T20428] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2600.304105][T20428] __alloc_skb+0x19d/0x450 [ 2600.308530][T20428] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2600.313839][T20428] rtmsg_ifinfo+0x58/0xc0 [ 2600.318170][T20428] netdev_state_change+0x115/0x170 [ 2600.323356][T20428] do_setlink+0x24a/0x2410 [ 2600.327776][T20428] ? __nla_validate_parse+0x108f/0x1760 [ 2600.333359][T20428] ? __nla_parse+0x3c/0x50 [ 2600.337853][T20428] rtnl_newlink+0xb10/0x13b0 [ 2600.342472][T20428] ? __rcu_read_unlock+0x5c/0x290 [ 2600.347496][T20428] ? rtnl_setlink+0x2a0/0x2a0 [ 2600.352185][T20428] rtnetlink_rcv_msg+0x745/0x7e0 [ 2600.357218][T20428] ? ___cache_free+0x46/0x300 [ 2600.361894][T20428] ? kmem_cache_free+0x65/0x110 [ 2600.366750][T20428] ? __kfree_skb+0xfe/0x150 [ 2600.371318][T20428] ? consume_skb+0x48/0x160 [ 2600.375871][T20428] ? nlmon_xmit+0x5f/0x70 [ 2600.380209][T20428] ? __this_cpu_preempt_check+0x18/0x20 [ 2600.385767][T20428] ? __local_bh_enable_ip+0x4d/0x70 [ 2600.390996][T20428] ? local_bh_enable+0x1b/0x20 [ 2600.395755][T20428] ? __dev_queue_xmit+0x597/0xf70 [ 2600.400810][T20428] ? __skb_clone+0x2db/0x300 [ 2600.405408][T20428] ? __rcu_read_unlock+0x5c/0x290 [ 2600.410434][T20428] netlink_rcv_skb+0x14e/0x250 [ 2600.415206][T20428] ? rtnetlink_bind+0x60/0x60 [ 2600.419887][T20428] rtnetlink_rcv+0x18/0x20 [ 2600.424371][T20428] netlink_unicast+0x5fc/0x6c0 [ 2600.429307][T20428] netlink_sendmsg+0x726/0x840 [ 2600.434147][T20428] ? netlink_getsockopt+0x720/0x720 [ 2600.439441][T20428] ____sys_sendmsg+0x39a/0x510 [ 2600.444273][T20428] __sys_sendmsg+0x195/0x230 [ 2600.448941][T20428] __x64_sys_sendmsg+0x42/0x50 [ 2600.453869][T20428] do_syscall_64+0x44/0xd0 [ 2600.458342][T20428] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2600.464400][T20428] RIP: 0033:0x7f3f1b516ae9 [ 2600.468796][T20428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2600.488410][T20428] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2600.496882][T20428] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2600.504831][T20428] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2600.512783][T20428] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 03:35:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8940, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 37) [ 2600.520738][T20428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2600.528742][T20428] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2600.536791][T20428] [ 2600.544060][T20428] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2600.554117][T20428] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:40 executing program 1: preadv(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002040)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000200)={r0, 0x8, 0x1, [0x7f, 0x628f, 0x0, 0x1, 0x2], [0x4, 0x81, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x7, 0x7ff, 0x1, 0x7, 0x0, 0x5, 0x6d5d202d, 0x9, 0x80000001, 0x0, 0x8, 0x5, 0x10100000, 0xfa, 0x20, 0x100000000, 0x81, 0x69ab, 0x0, 0x3, 0x0, 0x43, 0x0, 0xb14, 0x8, 0x1000000000, 0x0, 0x3, 0x0, 0x8, 0x0, 0x4, 0x8, 0x0, 0x1000, 0x9, 0x4, 0x9, 0x5, 0x8, 0x6, 0x6, 0xe3, 0x6, 0x0, 0xe0, 0x0, 0x2, 0xfffffffffffffff8, 0x0, 0x10000, 0x4, 0x3, 0x2, 0x0, 0x0, 0x8, 0xfffffffffffff8f1, 0x5, 0xeda, 0x10000, 0x0, 0x10001, 0x9, 0x2, 0x1, 0xffffffffffffffff, 0x6, 0x8, 0x5, 0x0, 0x8e2, 0x80000000, 0x1, 0x0, 0x6, 0x7, 0x7, 0x6, 0x0, 0x9, 0x2, 0xb37, 0x159, 0x0, 0x1, 0x10000, 0x800, 0xb56, 0x7ff, 0xdb, 0x0, 0x10000, 0x0, 0x8, 0x1000, 0x8, 0x0, 0x4, 0x3, 0x0, 0x2, 0x7fffffff, 0x0, 0x4, 0x2, 0x7, 0x0, 0xffffffff, 0x7, 0x7, 0x100000001, 0x0, 0x3, 0x7]}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000002c0)={0x4, 0x0, {0x0, @struct={0x8, 0x3}, 0x0, 0x2, 0x100, 0x7, 0x100000000, 0x4, 0x0, @usage=0x4, 0x3ff, 0x80000001, [0xd, 0x7fffffff, 0x8, 0x401, 0x8f7, 0x2]}, {0x7fffffff, @usage=0x3ff, r0, 0x1, 0x81, 0x101, 0x80, 0xa00000, 0x420, @struct={0x5, 0x8}, 0x9a8, 0x1a, [0xfff, 0x7f, 0x2, 0x1, 0x20, 0x3]}, {0xf7, @usage=0x707f, 0x0, 0x1, 0xfff, 0x8f, 0x100000001, 0x0, 0x401, @struct={0x0, 0x7}, 0x6, 0xfc3, [0x2, 0x8, 0x0, 0x2, 0x5, 0x3]}, {0x4d1d, 0x7, 0x100000000000000}}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002040)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000200)={r1, 0x8, 0x1, [0x7f, 0x628f, 0x0, 0x1, 0x2], [0x4, 0x81, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x7, 0x7ff, 0x1, 0x7, 0x0, 0x5, 0x6d5d202d, 0x9, 0x80000001, 0x0, 0x8, 0x5, 0x10100000, 0xfa, 0x20, 0x100000000, 0x81, 0x69ab, 0x0, 0x3, 0x0, 0x43, 0x0, 0xb14, 0x8, 0x1000000000, 0x0, 0x3, 0x0, 0x8, 0x0, 0x4, 0x8, 0x0, 0x1000, 0x9, 0x4, 0x9, 0x5, 0x8, 0x6, 0x6, 0xe3, 0x6, 0x0, 0xe0, 0x0, 0x2, 0xfffffffffffffff8, 0x0, 0x10000, 0x4, 0x3, 0x2, 0x0, 0x0, 0x8, 0xfffffffffffff8f1, 0x5, 0xeda, 0x10000, 0x0, 0x10001, 0x9, 0x2, 0x1, 0xffffffffffffffff, 0x6, 0x8, 0x5, 0x0, 0x8e2, 0x80000000, 0x1, 0x0, 0x6, 0x7, 0x7, 0x6, 0x0, 0x9, 0x2, 0xb37, 0x159, 0x0, 0x1, 0x10000, 0x800, 0xb56, 0x7ff, 0xdb, 0x0, 0x10000, 0x0, 0x8, 0x1000, 0x8, 0x0, 0x4, 0x3, 0x0, 0x2, 0x7fffffff, 0x0, 0x4, 0x2, 0x7, 0x0, 0xffffffff, 0x7, 0x7, 0x100000001, 0x0, 0x3, 0x7]}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000002c0)={0x4, 0x0, {0x0, @struct={0x8, 0x3}, 0x0, 0x2, 0x100, 0x7, 0x100000000, 0x4, 0x0, @usage=0x4, 0x3ff, 0x80000001, [0xd, 0x7fffffff, 0x8, 0x401, 0x8f7, 0x2]}, {0x7fffffff, @usage=0x3ff, r1, 0x1, 0x81, 0x101, 0x80, 0xa00000, 0x420, @struct={0x5, 0x8}, 0x9a8, 0x1a, [0xfff, 0x7f, 0x2, 0x1, 0x20, 0x3]}, {0xf7, @usage=0x707f, 0x0, 0x1, 0xfff, 0x8f, 0x100000001, 0x0, 0x401, @struct={0x0, 0x7}, 0x6, 0xfc3, [0x2, 0x8, 0x0, 0x2, 0x5, 0x3]}, {0x4d1d, 0x7, 0x100000000000000}}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000002040)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000200)={r2, 0x8, 0x1, [0x7f, 0x628f, 0x0, 0x1, 0x2], [0x4, 0x81, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x7, 0x7ff, 0x1, 0x7, 0x0, 0x5, 0x6d5d202d, 0x9, 0x80000001, 0x0, 0x8, 0x5, 0x10100000, 0xfa, 0x20, 0x100000000, 0x81, 0x69ab, 0x0, 0x3, 0x0, 0x43, 0x0, 0xb14, 0x8, 0x1000000000, 0x0, 0x3, 0x0, 0x8, 0x0, 0x4, 0x8, 0x0, 0x1000, 0x9, 0x4, 0x9, 0x5, 0x8, 0x6, 0x6, 0xe3, 0x6, 0x0, 0xe0, 0x0, 0x2, 0xfffffffffffffff8, 0x0, 0x10000, 0x4, 0x3, 0x2, 0x0, 0x0, 0x8, 0xfffffffffffff8f1, 0x5, 0xeda, 0x10000, 0x0, 0x10001, 0x9, 0x2, 0x1, 0xffffffffffffffff, 0x6, 0x8, 0x5, 0x0, 0x8e2, 0x80000000, 0x1, 0x0, 0x6, 0x7, 0x7, 0x6, 0x0, 0x9, 0x2, 0xb37, 0x159, 0x0, 0x1, 0x10000, 0x800, 0xb56, 0x7ff, 0xdb, 0x0, 0x10000, 0x0, 0x8, 0x1000, 0x8, 0x0, 0x4, 0x3, 0x0, 0x2, 0x7fffffff, 0x0, 0x4, 0x2, 0x7, 0x0, 0xffffffff, 0x7, 0x7, 0x100000001, 0x0, 0x3, 0x7]}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000002c0)={0x4, 0x0, {0x0, @struct={0x8, 0x3}, 0x0, 0x2, 0x100, 0x7, 0x100000000, 0x4, 0x0, @usage=0x4, 0x3ff, 0x80000001, [0xd, 0x7fffffff, 0x8, 0x401, 0x8f7, 0x2]}, {0x7fffffff, @usage=0x3ff, r2, 0x1, 0x81, 0x101, 0x80, 0xa00000, 0x420, @struct={0x5, 0x8}, 0x9a8, 0x1a, [0xfff, 0x7f, 0x2, 0x1, 0x20, 0x3]}, {0xf7, @usage=0x707f, 0x0, 0x1, 0xfff, 0x8f, 0x100000001, 0x0, 0x401, @struct={0x0, 0x7}, 0x6, 0xfc3, [0x2, 0x8, 0x0, 0x2, 0x5, 0x3]}, {0x4d1d, 0x7, 0x100000000000000}}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000000)={0x10, 0x5, {0xfffffffffffffeff, @usage=0x4, r0, 0x7, 0x4b, 0x5, 0x9, 0x4, 0x0, @struct={0xffff, 0x2}, 0xe52, 0x7, [0x9, 0x0, 0x9, 0x395, 0x896, 0x2]}, {0x3, @struct={0xfffffffb, 0x4097}, r1, 0x8000, 0x7, 0x0, 0xe004, 0x5, 0x44f, @struct={0x5, 0x3}, 0x80, 0x5, [0x3d4, 0x101, 0x100, 0x8, 0x400, 0x101]}, {0x3, @struct={0x6, 0x7fff}, r2, 0x9, 0x8, 0x80000000, 0x79f, 0x9, 0x86, @usage=0x3f, 0x1, 0xa3, [0x1, 0x5, 0x600000, 0x101, 0x3ff, 0x20]}, {0x40, 0x9, 0xfffffffffffffffc}}) 03:35:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x81ffffff}]}, 0x28}}, 0x0) [ 2600.655040][T20438] FAULT_INJECTION: forcing a failure. [ 2600.655040][T20438] name failslab, interval 1, probability 0, space 0, times 0 [ 2600.667745][T20438] CPU: 0 PID: 20438 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2600.678026][T20438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2600.688076][T20438] Call Trace: [ 2600.691354][T20438] [ 2600.694280][T20438] dump_stack_lvl+0xd6/0x122 [ 2600.698879][T20438] dump_stack+0x11/0x1b [ 2600.703057][T20438] should_fail+0x23c/0x250 [ 2600.707573][T20438] __should_failslab+0x81/0x90 [ 2600.712357][T20438] should_failslab+0x5/0x20 [ 2600.716954][T20438] kmem_cache_alloc_node+0x61/0x2d0 [ 2600.720429][T20440] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2600.722168][T20438] ? __rcu_read_unlock+0x5c/0x290 [ 2600.722192][T20438] ? fib_sync_up+0x51c/0x550 [ 2600.722247][T20438] ? __alloc_skb+0xf0/0x450 [ 2600.722272][T20438] __alloc_skb+0xf0/0x450 [ 2600.722295][T20438] rtmsg_ifinfo_build_skb+0x61/0x130 03:35:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=@random={'user.', ']-&~/\x00'}, &(0x7f0000000700)=""/187, 0xbb) 03:35:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'bond_slave_1\x00', {0x3}, 0xef}) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) [ 2600.722318][T20438] rtmsg_ifinfo+0x58/0xc0 [ 2600.722355][T20438] netdev_state_change+0x115/0x170 [ 2600.749056][T20440] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2600.750091][T20438] do_setlink+0x24a/0x2410 [ 2600.750121][T20438] ? __nla_validate_parse+0x108f/0x1760 [ 2600.750192][T20438] ? __nla_parse+0x3c/0x50 [ 2600.788651][T20438] rtnl_newlink+0xb10/0x13b0 [ 2600.793251][T20438] ? __rcu_read_unlock+0x5c/0x290 [ 2600.798281][T20438] ? rtnl_setlink+0x2a0/0x2a0 [ 2600.802971][T20438] rtnetlink_rcv_msg+0x745/0x7e0 [ 2600.807984][T20438] ? ___cache_free+0x46/0x300 [ 2600.812662][T20438] ? kmem_cache_free+0x65/0x110 [ 2600.817592][T20438] ? __kfree_skb+0xfe/0x150 [ 2600.822083][T20438] ? consume_skb+0x48/0x160 [ 2600.826593][T20438] ? nlmon_xmit+0x5f/0x70 [ 2600.830949][T20438] ? __this_cpu_preempt_check+0x18/0x20 [ 2600.836589][T20438] ? __local_bh_enable_ip+0x4d/0x70 [ 2600.841796][T20438] ? local_bh_enable+0x1b/0x20 [ 2600.846559][T20438] ? __dev_queue_xmit+0x597/0xf70 [ 2600.851630][T20438] ? __skb_clone+0x2db/0x300 [ 2600.856392][T20438] ? __rcu_read_unlock+0x5c/0x290 [ 2600.861476][T20438] netlink_rcv_skb+0x14e/0x250 [ 2600.866248][T20438] ? rtnetlink_bind+0x60/0x60 [ 2600.871123][T20438] rtnetlink_rcv+0x18/0x20 [ 2600.875525][T20438] netlink_unicast+0x5fc/0x6c0 [ 2600.880461][T20438] netlink_sendmsg+0x726/0x840 [ 2600.885247][T20438] ? netlink_getsockopt+0x720/0x720 [ 2600.890431][T20438] ____sys_sendmsg+0x39a/0x510 [ 2600.895216][T20438] __sys_sendmsg+0x195/0x230 [ 2600.899885][T20438] __x64_sys_sendmsg+0x42/0x50 [ 2600.904719][T20438] do_syscall_64+0x44/0xd0 [ 2600.909290][T20438] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2600.915244][T20438] RIP: 0033:0x7f2f40028ae9 [ 2600.919644][T20438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2600.939230][T20438] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2600.948058][T20438] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2600.956018][T20438] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2600.964198][T20438] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2600.972157][T20438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2600.980128][T20438] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2600.988099][T20438] [ 2600.995282][T20438] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 12) [ 2601.008872][T20449] FAULT_INJECTION: forcing a failure. [ 2601.008872][T20449] name failslab, interval 1, probability 0, space 0, times 0 [ 2601.021509][T20449] CPU: 0 PID: 20449 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2601.031786][T20449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2601.041884][T20449] Call Trace: [ 2601.045183][T20449] [ 2601.048110][T20449] dump_stack_lvl+0xd6/0x122 [ 2601.052707][T20449] dump_stack+0x11/0x1b [ 2601.056890][T20449] should_fail+0x23c/0x250 [ 2601.061411][T20449] __should_failslab+0x81/0x90 [ 2601.064228][T20456] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2601.066306][T20449] should_failslab+0x5/0x20 [ 2601.066333][T20449] kmem_cache_alloc_node_trace+0x61/0x310 [ 2601.066357][T20449] ? __kmalloc_node_track_caller+0x30/0x40 [ 2601.066412][T20449] __kmalloc_node_track_caller+0x30/0x40 [ 2601.066489][T20449] ? netlink_trim+0x112/0x140 [ 2601.066512][T20449] pskb_expand_head+0xca/0x8b0 [ 2601.066537][T20449] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2601.112046][T20449] netlink_trim+0x112/0x140 [ 2601.116547][T20449] netlink_broadcast+0x42/0xad0 [ 2601.121385][T20449] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2601.126846][T20449] nlmsg_notify+0xc7/0x170 [ 2601.131256][T20449] rtmsg_ifinfo+0xa4/0xc0 [ 2601.135682][T20449] netdev_state_change+0x115/0x170 [ 2601.140869][T20449] do_setlink+0x24a/0x2410 [ 2601.145281][T20449] ? __nla_validate_parse+0x108f/0x1760 [ 2601.150873][T20449] ? __nla_parse+0x3c/0x50 [ 2601.155348][T20449] rtnl_newlink+0xb10/0x13b0 [ 2601.160012][T20449] ? rtnl_setlink+0x2a0/0x2a0 [ 2601.164744][T20449] rtnetlink_rcv_msg+0x745/0x7e0 [ 2601.169705][T20449] ? ___cache_free+0x46/0x300 [ 2601.174375][T20449] ? __this_cpu_preempt_check+0x18/0x20 [ 2601.179916][T20449] ? kmem_cache_free+0x65/0x110 [ 2601.184746][T20449] ? __kfree_skb+0xfe/0x150 [ 2601.189280][T20449] ? consume_skb+0x48/0x160 [ 2601.193763][T20449] ? nlmon_xmit+0x5f/0x70 [ 2601.198096][T20449] ? __this_cpu_preempt_check+0x18/0x20 [ 2601.203714][T20449] ? __local_bh_enable_ip+0x4d/0x70 [ 2601.208907][T20449] ? local_bh_enable+0x1b/0x20 [ 2601.213661][T20449] ? __dev_queue_xmit+0x597/0xf70 [ 2601.218674][T20449] ? __skb_clone+0x2db/0x300 [ 2601.223246][T20449] ? __rcu_read_unlock+0x5c/0x290 [ 2601.228250][T20449] netlink_rcv_skb+0x14e/0x250 [ 2601.233077][T20449] ? rtnetlink_bind+0x60/0x60 [ 2601.237803][T20449] rtnetlink_rcv+0x18/0x20 [ 2601.242252][T20449] netlink_unicast+0x5fc/0x6c0 [ 2601.247058][T20449] netlink_sendmsg+0x726/0x840 [ 2601.251850][T20449] ? netlink_getsockopt+0x720/0x720 [ 2601.257076][T20449] ____sys_sendmsg+0x39a/0x510 [ 2601.261904][T20449] __sys_sendmsg+0x195/0x230 [ 2601.266583][T20449] __x64_sys_sendmsg+0x42/0x50 [ 2601.271348][T20449] do_syscall_64+0x44/0xd0 [ 2601.275930][T20449] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2601.281802][T20449] RIP: 0033:0x7f3f1b516ae9 [ 2601.286198][T20449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2601.305880][T20449] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2601.314315][T20449] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2601.322269][T20449] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2601.330386][T20449] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2601.338380][T20449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2601.346373][T20449] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2601.354332][T20449] 03:35:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x88470000}]}, 0x28}}, 0x0) 03:35:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/19, 0x13}, {&(0x7f0000000040)=""/185, 0xb9}, {&(0x7f0000000100)=""/98, 0x62}, {&(0x7f00000011c0)=""/76, 0x4c}, {&(0x7f0000001240)=""/52, 0x34}, {&(0x7f0000001280)=""/211, 0xd3}, {&(0x7f0000001380)=""/70, 0x46}], 0x8, 0x92e, 0x8e) 03:35:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8941, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 38) [ 2601.361620][T20449] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2601.370978][T20449] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2601.399156][T20458] FAULT_INJECTION: forcing a failure. [ 2601.399156][T20458] name failslab, interval 1, probability 0, space 0, times 0 [ 2601.411813][T20458] CPU: 1 PID: 20458 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2601.413963][T20456] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2601.421969][T20458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2601.421983][T20458] Call Trace: [ 2601.421989][T20458] [ 2601.421995][T20458] dump_stack_lvl+0xd6/0x122 [ 2601.422020][T20458] dump_stack+0x11/0x1b [ 2601.422097][T20458] should_fail+0x23c/0x250 [ 2601.422116][T20458] __should_failslab+0x81/0x90 [ 2601.422138][T20458] should_failslab+0x5/0x20 [ 2601.422160][T20458] kmem_cache_alloc_node_trace+0x61/0x310 [ 2601.475852][T20458] ? __kmalloc_node_track_caller+0x30/0x40 [ 2601.481679][T20458] __kmalloc_node_track_caller+0x30/0x40 [ 2601.487512][T20458] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2601.493011][T20458] __alloc_skb+0x19d/0x450 [ 2601.497458][T20458] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2601.502725][T20458] rtmsg_ifinfo+0x58/0xc0 [ 2601.507036][T20458] netdev_state_change+0x115/0x170 [ 2601.512206][T20458] do_setlink+0x24a/0x2410 [ 2601.516751][T20458] ? __nla_validate_parse+0x108f/0x1760 [ 2601.522288][T20458] ? __nla_parse+0x3c/0x50 [ 2601.526689][T20458] rtnl_newlink+0xb10/0x13b0 [ 2601.531343][T20458] ? rtnl_setlink+0x2a0/0x2a0 [ 2601.536443][T20458] rtnetlink_rcv_msg+0x745/0x7e0 [ 2601.541383][T20458] ? ___cache_free+0x46/0x300 [ 2601.546066][T20458] ? kmem_cache_free+0x65/0x110 [ 2601.550942][T20458] ? __kfree_skb+0xfe/0x150 [ 2601.555483][T20458] ? consume_skb+0x48/0x160 [ 2601.559988][T20458] ? nlmon_xmit+0x5f/0x70 [ 2601.564307][T20458] ? __this_cpu_preempt_check+0x18/0x20 [ 2601.569857][T20458] ? __local_bh_enable_ip+0x4d/0x70 [ 2601.575035][T20458] ? local_bh_enable+0x1b/0x20 [ 2601.579884][T20458] ? __dev_queue_xmit+0x597/0xf70 [ 2601.584893][T20458] ? __skb_clone+0x2db/0x300 [ 2601.589467][T20458] ? __rcu_read_unlock+0x5c/0x290 [ 2601.594493][T20458] netlink_rcv_skb+0x14e/0x250 [ 2601.599268][T20458] ? rtnetlink_bind+0x60/0x60 [ 2601.603981][T20458] rtnetlink_rcv+0x18/0x20 [ 2601.608376][T20458] netlink_unicast+0x5fc/0x6c0 [ 2601.613150][T20458] netlink_sendmsg+0x726/0x840 [ 2601.617896][T20458] ? netlink_getsockopt+0x720/0x720 [ 2601.623091][T20458] ____sys_sendmsg+0x39a/0x510 [ 2601.627871][T20458] __sys_sendmsg+0x195/0x230 [ 2601.632570][T20458] __x64_sys_sendmsg+0x42/0x50 [ 2601.637329][T20458] do_syscall_64+0x44/0xd0 [ 2601.641750][T20458] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2601.647626][T20458] RIP: 0033:0x7f2f40028ae9 [ 2601.652188][T20458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2601.671769][T20458] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2601.680259][T20458] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2601.688284][T20458] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2601.696241][T20458] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2601.704201][T20458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:35:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000080)) setsockopt$sock_int(r2, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 13) [ 2601.712149][T20458] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2601.720100][T20458] [ 2601.729514][T20458] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x88480000}]}, 0x28}}, 0x0) 03:35:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000080)) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x401) 03:35:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x894c, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2601.942307][T20473] FAULT_INJECTION: forcing a failure. [ 2601.942307][T20473] name failslab, interval 1, probability 0, space 0, times 0 [ 2601.955005][T20473] CPU: 0 PID: 20473 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2601.965158][T20473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2601.975302][T20473] Call Trace: [ 2601.975521][T20475] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2601.978587][T20473] [ 2601.978595][T20473] dump_stack_lvl+0xd6/0x122 [ 2601.978634][T20473] dump_stack+0x11/0x1b [ 2601.999835][T20473] should_fail+0x23c/0x250 [ 2602.004371][T20473] __should_failslab+0x81/0x90 [ 2602.009124][T20473] should_failslab+0x5/0x20 [ 2602.013617][T20473] kmem_cache_alloc_node+0x61/0x2d0 [ 2602.019081][T20473] ? __rcu_read_unlock+0x5c/0x290 [ 2602.024105][T20473] ? __alloc_skb+0xf0/0x450 [ 2602.028680][T20473] __alloc_skb+0xf0/0x450 [ 2602.033015][T20473] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2602.038376][T20473] rtmsg_ifinfo+0x58/0xc0 03:35:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @private=0xa010102}, 0x10) [ 2602.042796][T20473] netdev_state_change+0x115/0x170 [ 2602.047999][T20473] do_setlink+0x24a/0x2410 [ 2602.052706][T20473] ? __nla_validate_parse+0x108f/0x1760 [ 2602.058322][T20473] ? __nla_parse+0x3c/0x50 [ 2602.062740][T20473] rtnl_newlink+0xb10/0x13b0 [ 2602.067361][T20473] ? __rcu_read_unlock+0x5c/0x290 [ 2602.072481][T20473] ? rtnl_setlink+0x2a0/0x2a0 [ 2602.077201][T20473] rtnetlink_rcv_msg+0x745/0x7e0 [ 2602.082210][T20473] ? ___cache_free+0x46/0x300 [ 2602.086874][T20473] ? kmem_cache_free+0x65/0x110 [ 2602.091806][T20473] ? __kfree_skb+0xfe/0x150 [ 2602.096385][T20473] ? consume_skb+0x48/0x160 [ 2602.100888][T20473] ? nlmon_xmit+0x5f/0x70 [ 2602.105213][T20473] ? __this_cpu_preempt_check+0x18/0x20 [ 2602.110842][T20473] ? __local_bh_enable_ip+0x4d/0x70 [ 2602.116153][T20473] ? local_bh_enable+0x1b/0x20 [ 2602.120924][T20473] ? __dev_queue_xmit+0x597/0xf70 [ 2602.125995][T20473] ? __skb_clone+0x2db/0x300 [ 2602.130575][T20473] ? __rcu_read_unlock+0x5c/0x290 [ 2602.135595][T20473] netlink_rcv_skb+0x14e/0x250 03:35:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) [ 2602.140365][T20473] ? rtnetlink_bind+0x60/0x60 [ 2602.145108][T20473] rtnetlink_rcv+0x18/0x20 [ 2602.149508][T20473] netlink_unicast+0x5fc/0x6c0 [ 2602.154278][T20473] netlink_sendmsg+0x726/0x840 [ 2602.159126][T20473] ? netlink_getsockopt+0x720/0x720 [ 2602.164346][T20473] ____sys_sendmsg+0x39a/0x510 [ 2602.169198][T20473] __sys_sendmsg+0x195/0x230 [ 2602.173781][T20473] __x64_sys_sendmsg+0x42/0x50 [ 2602.178556][T20473] do_syscall_64+0x44/0xd0 [ 2602.183038][T20473] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2602.188917][T20473] RIP: 0033:0x7f3f1b516ae9 03:35:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x80010, r0, 0xc0eed000) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x8, 0x81, 0x1, 0x0, 0x0, 0x0, 0x8, 0xd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x7, 0x7}, 0x8, 0x3, 0x2, 0x4, 0x8001, 0x6, 0x9, 0x0, 0x10001, 0x0, 0x8000}, 0xffffffffffffffff, 0x8, r1, 0x8) [ 2602.193364][T20473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2602.213413][T20473] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2602.221903][T20473] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2602.229957][T20473] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2602.237923][T20473] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2602.245943][T20473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2602.253995][T20473] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2602.261974][T20473] [ 2602.268656][T20473] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2602.278917][T20473] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 39) 03:35:42 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x325880, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f00000001c0)=0x401) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xac, 0x2, 0x9, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x2}}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x4}}, @NFCTH_TUPLE={0x54, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2b}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x4}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_STATUS={0x8}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x14}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x10}]}, 0xac}, 0x1, 0x0, 0x0, 0x400}, 0x850) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) [ 2602.295123][T20474] FAULT_INJECTION: forcing a failure. [ 2602.295123][T20474] name failslab, interval 1, probability 0, space 0, times 0 [ 2602.307852][T20474] CPU: 0 PID: 20474 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2602.317997][T20474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2602.329345][T20474] Call Trace: [ 2602.332618][T20474] [ 2602.335539][T20474] dump_stack_lvl+0xd6/0x122 [ 2602.340198][T20474] dump_stack+0x11/0x1b [ 2602.344403][T20474] should_fail+0x23c/0x250 [ 2602.348818][T20474] __should_failslab+0x81/0x90 [ 2602.353812][T20474] should_failslab+0x5/0x20 [ 2602.358307][T20474] kmem_cache_alloc_node_trace+0x61/0x310 [ 2602.364101][T20474] ? __kmalloc_node_track_caller+0x30/0x40 [ 2602.370089][T20474] __kmalloc_node_track_caller+0x30/0x40 [ 2602.375866][T20474] ? netlink_trim+0x112/0x140 [ 2602.380551][T20474] pskb_expand_head+0xca/0x8b0 [ 2602.385345][T20474] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2602.390544][T20474] netlink_trim+0x112/0x140 [ 2602.395050][T20474] netlink_broadcast+0x42/0xad0 [ 2602.399899][T20474] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2602.405387][T20474] nlmsg_notify+0xc7/0x170 [ 2602.409794][T20474] rtmsg_ifinfo+0xa4/0xc0 [ 2602.414121][T20474] netdev_state_change+0x115/0x170 [ 2602.419349][T20474] do_setlink+0x24a/0x2410 [ 2602.423774][T20474] ? __nla_validate_parse+0x108f/0x1760 [ 2602.429478][T20474] ? __nla_parse+0x3c/0x50 [ 2602.433915][T20474] rtnl_newlink+0xb10/0x13b0 [ 2602.438597][T20474] ? detach_tasks+0x2d0/0x3a0 03:35:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f0000000000), 0x0, 0x1f, 0x3) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) [ 2602.443268][T20474] ? rtnl_setlink+0x2a0/0x2a0 [ 2602.447984][T20474] rtnetlink_rcv_msg+0x745/0x7e0 [ 2602.453046][T20474] ? ___cache_free+0x46/0x300 [ 2602.457921][T20474] ? kmem_cache_free+0x65/0x110 [ 2602.462774][T20474] ? __kfree_skb+0xfe/0x150 [ 2602.467349][T20474] ? consume_skb+0x48/0x160 [ 2602.471861][T20474] ? nlmon_xmit+0x5f/0x70 [ 2602.476349][T20474] ? __this_cpu_preempt_check+0x18/0x20 [ 2602.481979][T20474] ? __local_bh_enable_ip+0x4d/0x70 [ 2602.487182][T20474] ? local_bh_enable+0x1b/0x20 [ 2602.492296][T20474] ? __dev_queue_xmit+0x597/0xf70 [ 2602.497327][T20474] ? __skb_clone+0x2db/0x300 [ 2602.501926][T20474] ? __rcu_read_unlock+0x5c/0x290 [ 2602.507175][T20474] netlink_rcv_skb+0x14e/0x250 [ 2602.511993][T20474] ? rtnetlink_bind+0x60/0x60 [ 2602.516670][T20474] rtnetlink_rcv+0x18/0x20 [ 2602.521067][T20474] netlink_unicast+0x5fc/0x6c0 [ 2602.526041][T20474] netlink_sendmsg+0x726/0x840 [ 2602.530929][T20474] ? netlink_getsockopt+0x720/0x720 [ 2602.536134][T20474] ____sys_sendmsg+0x39a/0x510 [ 2602.541061][T20474] __sys_sendmsg+0x195/0x230 [ 2602.545731][T20474] __x64_sys_sendmsg+0x42/0x50 [ 2602.550553][T20474] do_syscall_64+0x44/0xd0 [ 2602.554973][T20474] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2602.560955][T20474] RIP: 0033:0x7f2f40028ae9 [ 2602.565471][T20474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2602.585067][T20474] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2602.593476][T20474] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2602.601477][T20474] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2602.609447][T20474] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2602.617404][T20474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2602.625370][T20474] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2602.633386][T20474] 03:35:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f0000000340)={0x34, 0x0, 0x4, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x6}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x43}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000084) 03:35:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000080)) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x640, 0x4) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000000080)) mmap(&(0x7f0000ff8000/0x5000)=nil, 0x5000, 0x2000004, 0x810, r1, 0x17581000) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) fallocate(r1, 0x1, 0x6, 0x88df) [ 2602.642288][T20474] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2602.657332][T20499] FAULT_INJECTION: forcing a failure. [ 2602.657332][T20499] name failslab, interval 1, probability 0, space 0, times 0 [ 2602.661986][T20506] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2602.670003][T20499] CPU: 1 PID: 20499 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2602.689877][T20499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2602.699929][T20499] Call Trace: [ 2602.703204][T20499] [ 2602.706158][T20499] dump_stack_lvl+0xd6/0x122 [ 2602.710824][T20499] dump_stack+0x11/0x1b [ 2602.715017][T20499] should_fail+0x23c/0x250 [ 2602.719410][T20499] __should_failslab+0x81/0x90 [ 2602.724152][T20499] should_failslab+0x5/0x20 [ 2602.728757][T20499] kmem_cache_alloc_node_trace+0x61/0x310 [ 2602.734623][T20499] ? __kmalloc_node_track_caller+0x30/0x40 [ 2602.740415][T20499] __kmalloc_node_track_caller+0x30/0x40 [ 2602.746030][T20499] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2602.751470][T20499] __alloc_skb+0x19d/0x450 [ 2602.755885][T20499] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2602.761236][T20499] rtmsg_ifinfo+0x58/0xc0 [ 2602.765600][T20499] netdev_state_change+0x115/0x170 [ 2602.770698][T20499] do_setlink+0x24a/0x2410 [ 2602.775113][T20499] ? __nla_validate_parse+0x108f/0x1760 [ 2602.780722][T20499] ? __nla_parse+0x3c/0x50 [ 2602.785138][T20499] rtnl_newlink+0xb10/0x13b0 [ 2602.789791][T20499] ? detach_tasks+0x2d0/0x3a0 [ 2602.794467][T20499] ? rtnl_setlink+0x2a0/0x2a0 [ 2602.800917][T20499] rtnetlink_rcv_msg+0x745/0x7e0 [ 2602.805861][T20499] ? ___cache_free+0x46/0x300 [ 2602.810562][T20499] ? kmem_cache_free+0x65/0x110 [ 2602.815392][T20499] ? __kfree_skb+0xfe/0x150 [ 2602.819932][T20499] ? consume_skb+0x48/0x160 [ 2602.824425][T20499] ? nlmon_xmit+0x5f/0x70 [ 2602.828749][T20499] ? __this_cpu_preempt_check+0x18/0x20 [ 2602.834413][T20499] ? __local_bh_enable_ip+0x4d/0x70 [ 2602.839616][T20499] ? local_bh_enable+0x1b/0x20 [ 2602.844376][T20499] ? __dev_queue_xmit+0x597/0xf70 [ 2602.849393][T20499] ? __skb_clone+0x2db/0x300 [ 2602.854053][T20499] ? __rcu_read_unlock+0x5c/0x290 [ 2602.859093][T20499] netlink_rcv_skb+0x14e/0x250 [ 2602.863868][T20499] ? rtnetlink_bind+0x60/0x60 [ 2602.868541][T20499] rtnetlink_rcv+0x18/0x20 [ 2602.872953][T20499] netlink_unicast+0x5fc/0x6c0 [ 2602.877742][T20499] netlink_sendmsg+0x726/0x840 [ 2602.882494][T20499] ? netlink_getsockopt+0x720/0x720 [ 2602.887744][T20499] ____sys_sendmsg+0x39a/0x510 [ 2602.892496][T20499] __sys_sendmsg+0x195/0x230 [ 2602.897149][T20499] __x64_sys_sendmsg+0x42/0x50 [ 2602.901893][T20499] do_syscall_64+0x44/0xd0 [ 2602.906291][T20499] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2602.912224][T20499] RIP: 0033:0x7f3f1b516ae9 [ 2602.916620][T20499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2602.936860][T20499] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2602.945254][T20499] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2602.953400][T20499] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2602.961355][T20499] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2602.969308][T20499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2602.977298][T20499] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2602.985283][T20499] 03:35:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x88a8ffff}]}, 0x28}}, 0x0) 03:35:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 14) 03:35:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x89a0, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) 03:35:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 40) [ 2602.996369][T20499] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2603.006410][T20499] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:35:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000011c0)=[{&(0x7f0000002000)=""/4091, 0xffb}, {&(0x7f0000000000)=""/65, 0x41}, {&(0x7f0000003000)=""/4112, 0x1010}, {&(0x7f0000000140)=""/2, 0x2}, {&(0x7f0000001240)=""/186, 0xba}], 0x5, 0x0, 0xffffffff) preadv(r0, &(0x7f0000000000), 0x0, 0x4, 0x3) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x8902, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0xfffd, 0x3}, 0x8) [ 2603.229306][T20518] FAULT_INJECTION: forcing a failure. [ 2603.229306][T20518] name failslab, interval 1, probability 0, space 0, times 0 [ 2603.241979][T20518] CPU: 1 PID: 20518 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2603.252118][T20518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2603.262152][T20518] Call Trace: [ 2603.265417][T20518] [ 2603.268333][T20518] dump_stack_lvl+0xd6/0x122 [ 2603.273069][T20518] dump_stack+0x11/0x1b [ 2603.277265][T20518] should_fail+0x23c/0x250 [ 2603.281668][T20518] __should_failslab+0x81/0x90 [ 2603.286418][T20518] should_failslab+0x5/0x20 [ 2603.290904][T20518] kmem_cache_alloc_node+0x61/0x2d0 [ 2603.296086][T20518] ? __rcu_read_unlock+0x5c/0x290 [ 2603.301198][T20518] ? __alloc_skb+0xf0/0x450 [ 2603.305848][T20518] __alloc_skb+0xf0/0x450 [ 2603.310176][T20518] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2603.315457][T20518] rtmsg_ifinfo+0x58/0xc0 [ 2603.319789][T20518] netdev_state_change+0x115/0x170 [ 2603.324895][T20518] do_setlink+0x24a/0x2410 [ 2603.329308][T20518] ? __nla_validate_parse+0x108f/0x1760 [ 2603.334881][T20518] ? __nla_parse+0x3c/0x50 [ 2603.339308][T20518] rtnl_newlink+0xb10/0x13b0 [ 2603.343936][T20518] ? rtnl_setlink+0x2a0/0x2a0 [ 2603.348680][T20518] rtnetlink_rcv_msg+0x745/0x7e0 [ 2603.353745][T20518] ? ___cache_free+0x46/0x300 [ 2603.358414][T20518] ? kmem_cache_free+0x65/0x110 [ 2603.363278][T20518] ? __kfree_skb+0xfe/0x150 [ 2603.367826][T20518] ? consume_skb+0x48/0x160 [ 2603.372318][T20518] ? nlmon_xmit+0x5f/0x70 [ 2603.376630][T20518] ? __this_cpu_preempt_check+0x18/0x20 [ 2603.382186][T20518] ? __local_bh_enable_ip+0x4d/0x70 [ 2603.387508][T20518] ? local_bh_enable+0x1b/0x20 [ 2603.392317][T20518] ? __dev_queue_xmit+0x597/0xf70 [ 2603.397332][T20518] ? __skb_clone+0x2db/0x300 [ 2603.401902][T20518] ? __rcu_read_unlock+0x5c/0x290 [ 2603.407052][T20518] netlink_rcv_skb+0x14e/0x250 [ 2603.411802][T20518] ? rtnetlink_bind+0x60/0x60 [ 2603.416463][T20518] rtnetlink_rcv+0x18/0x20 [ 2603.420984][T20518] netlink_unicast+0x5fc/0x6c0 [ 2603.425776][T20518] netlink_sendmsg+0x726/0x840 [ 2603.430531][T20518] ? netlink_getsockopt+0x720/0x720 [ 2603.435723][T20518] ____sys_sendmsg+0x39a/0x510 [ 2603.440509][T20518] __sys_sendmsg+0x195/0x230 [ 2603.445272][T20518] __x64_sys_sendmsg+0x42/0x50 [ 2603.450104][T20518] do_syscall_64+0x44/0xd0 [ 2603.454550][T20518] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2603.460427][T20518] RIP: 0033:0x7f2f40028ae9 [ 2603.464820][T20518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2603.484467][T20518] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2603.492863][T20518] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2603.500960][T20518] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2603.508912][T20518] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2603.516869][T20518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 03:35:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0x9effffff}]}, 0x28}}, 0x0) 03:35:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 15) 03:35:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x89a1, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000700000108000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4001}, 0x4008080) [ 2603.524849][T20518] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 [ 2603.532803][T20518] [ 2603.540382][T20518] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2603.583586][T20520] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2603.585464][T20523] FAULT_INJECTION: forcing a failure. [ 2603.585464][T20523] name failslab, interval 1, probability 0, space 0, times 0 [ 2603.605698][T20523] CPU: 0 PID: 20523 Comm: syz-executor.3 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2603.615857][T20523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2603.625982][T20523] Call Trace: [ 2603.625989][T20523] 03:35:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="355ff9c3e4916a9063797b8deb763f565cd2df9a05cbb947dbdf0885a11bdd7700529eb413814241e9f019d978", 0x2d}], 0x1) [ 2603.625993][T20523] dump_stack_lvl+0xd6/0x122 [ 2603.626010][T20523] dump_stack+0x11/0x1b [ 2603.626021][T20523] should_fail+0x23c/0x250 [ 2603.626032][T20523] __should_failslab+0x81/0x90 [ 2603.626067][T20523] should_failslab+0x5/0x20 [ 2603.626080][T20523] kmem_cache_alloc_node_trace+0x61/0x310 [ 2603.626094][T20523] ? __kmalloc_node_track_caller+0x30/0x40 [ 2603.626107][T20523] __kmalloc_node_track_caller+0x30/0x40 [ 2603.626162][T20523] ? netlink_trim+0x112/0x140 [ 2603.626177][T20523] pskb_expand_head+0xca/0x8b0 [ 2603.626193][T20523] ? rtnl_fill_ifinfo+0x242b/0x2560 [ 2603.626207][T20523] netlink_trim+0x112/0x140 [ 2603.626286][T20523] netlink_broadcast+0x42/0xad0 [ 2603.626303][T20523] ? rtmsg_ifinfo_build_skb+0xa8/0x130 [ 2603.626326][T20523] nlmsg_notify+0xc7/0x170 [ 2603.705795][T20523] rtmsg_ifinfo+0xa4/0xc0 [ 2603.710217][T20523] netdev_state_change+0x115/0x170 [ 2603.715332][T20523] do_setlink+0x24a/0x2410 [ 2603.719786][T20523] ? __nla_validate_parse+0x108f/0x1760 [ 2603.725331][T20523] ? __nla_parse+0x3c/0x50 [ 2603.729854][T20523] rtnl_newlink+0xb10/0x13b0 [ 2603.734435][T20523] ? __rcu_read_unlock+0x5c/0x290 [ 2603.739479][T20523] ? rtnl_setlink+0x2a0/0x2a0 [ 2603.744140][T20523] rtnetlink_rcv_msg+0x745/0x7e0 [ 2603.749123][T20523] ? ___cache_free+0x46/0x300 [ 2603.753800][T20523] ? kmem_cache_free+0x65/0x110 [ 2603.758698][T20523] ? __kfree_skb+0xfe/0x150 [ 2603.763204][T20523] ? consume_skb+0x48/0x160 [ 2603.767751][T20523] ? nlmon_xmit+0x5f/0x70 [ 2603.772083][T20523] ? __this_cpu_preempt_check+0x18/0x20 [ 2603.777675][T20523] ? __local_bh_enable_ip+0x4d/0x70 03:35:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/97, 0x61}, {&(0x7f0000000080)=""/79, 0x4f}, {&(0x7f00000001c0)=""/213, 0xd5}], 0x3, 0x5986, 0x2) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000000080)) splice(r0, &(0x7f0000000140)=0x3, r1, &(0x7f00000002c0)=0x1000, 0x3fffffffc00, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f0000000000)=0xa, 0x4) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x101}, 0x8) getsockopt$inet6_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000080)) sendfile(r0, r2, 0x0, 0x7) r3 = accept$nfc_llcp(r0, &(0x7f0000000340), &(0x7f00000003c0)=0x60) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000400)='macsec0\x00', 0x10) [ 2603.782928][T20523] ? local_bh_enable+0x1b/0x20 [ 2603.787709][T20523] ? __dev_queue_xmit+0x597/0xf70 [ 2603.792826][T20523] ? __skb_clone+0x2db/0x300 [ 2603.797420][T20523] ? __rcu_read_unlock+0x5c/0x290 [ 2603.802455][T20523] netlink_rcv_skb+0x14e/0x250 [ 2603.807261][T20523] ? rtnetlink_bind+0x60/0x60 [ 2603.811992][T20523] rtnetlink_rcv+0x18/0x20 [ 2603.816432][T20523] netlink_unicast+0x5fc/0x6c0 [ 2603.821227][T20523] netlink_sendmsg+0x726/0x840 [ 2603.826084][T20523] ? netlink_getsockopt+0x720/0x720 [ 2603.831375][T20523] ____sys_sendmsg+0x39a/0x510 [ 2603.836145][T20523] __sys_sendmsg+0x195/0x230 [ 2603.840793][T20523] __x64_sys_sendmsg+0x42/0x50 [ 2603.845585][T20523] do_syscall_64+0x44/0xd0 [ 2603.849987][T20523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2603.855908][T20523] RIP: 0033:0x7f3f1b516ae9 [ 2603.860337][T20523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2603.880096][T20523] RSP: 002b:00007f3f1ac8d188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2603.888497][T20523] RAX: ffffffffffffffda RBX: 00007f3f1b629f60 RCX: 00007f3f1b516ae9 [ 2603.896469][T20523] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2603.904475][T20523] RBP: 00007f3f1ac8d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2603.912445][T20523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2603.920417][T20523] R13: 00007ffd2a6a526f R14: 00007f3f1ac8d300 R15: 0000000000022000 [ 2603.928605][T20523] [ 2603.936314][T20523] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2603.947300][T20523] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2603.964278][T20531] FAULT_INJECTION: forcing a failure. [ 2603.964278][T20531] name failslab, interval 1, probability 0, space 0, times 0 [ 2603.974888][T20520] netlink: 228 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2603.976967][T20531] CPU: 1 PID: 20531 Comm: syz-executor.5 Tainted: G W 5.16.0-rc3-syzkaller #0 [ 2603.996435][T20531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2604.006525][T20531] Call Trace: [ 2604.009808][T20531] [ 2604.012724][T20531] dump_stack_lvl+0xd6/0x122 [ 2604.017364][T20531] dump_stack+0x11/0x1b [ 2604.021501][T20531] should_fail+0x23c/0x250 [ 2604.025941][T20531] __should_failslab+0x81/0x90 [ 2604.030754][T20531] should_failslab+0x5/0x20 [ 2604.035292][T20531] kmem_cache_alloc_node_trace+0x61/0x310 [ 2604.041011][T20531] ? __kmalloc_node_track_caller+0x30/0x40 [ 2604.046802][T20531] __kmalloc_node_track_caller+0x30/0x40 [ 2604.052501][T20531] ? rtmsg_ifinfo_build_skb+0x61/0x130 [ 2604.057963][T20531] __alloc_skb+0x19d/0x450 [ 2604.062409][T20531] rtmsg_ifinfo_build_skb+0x61/0x130 [ 2604.067919][T20531] rtmsg_ifinfo+0x58/0xc0 [ 2604.072240][T20531] netdev_state_change+0x115/0x170 [ 2604.077357][T20531] do_setlink+0x24a/0x2410 [ 2604.081780][T20531] ? __nla_validate_parse+0x108f/0x1760 [ 2604.087589][T20531] ? __nla_parse+0x3c/0x50 [ 2604.092016][T20531] rtnl_newlink+0xb10/0x13b0 [ 2604.096598][T20531] ? rtnl_setlink+0x2a0/0x2a0 [ 2604.101293][T20531] rtnetlink_rcv_msg+0x745/0x7e0 [ 2604.106228][T20531] ? ___cache_free+0x46/0x300 [ 2604.111041][T20531] ? kmem_cache_free+0x65/0x110 [ 2604.115917][T20531] ? __kfree_skb+0xfe/0x150 [ 2604.120403][T20531] ? consume_skb+0x48/0x160 [ 2604.124983][T20531] ? nlmon_xmit+0x5f/0x70 [ 2604.129345][T20531] ? __this_cpu_preempt_check+0x18/0x20 [ 2604.134942][T20531] ? __local_bh_enable_ip+0x4d/0x70 [ 2604.140129][T20531] ? local_bh_enable+0x1b/0x20 [ 2604.144957][T20531] ? __dev_queue_xmit+0x597/0xf70 [ 2604.150020][T20531] ? __skb_clone+0x2db/0x300 [ 2604.154641][T20531] ? __rcu_read_unlock+0x5c/0x290 [ 2604.159710][T20531] netlink_rcv_skb+0x14e/0x250 [ 2604.164482][T20531] ? rtnetlink_bind+0x60/0x60 [ 2604.169264][T20531] rtnetlink_rcv+0x18/0x20 [ 2604.173717][T20531] netlink_unicast+0x5fc/0x6c0 [ 2604.178510][T20531] netlink_sendmsg+0x726/0x840 [ 2604.183349][T20531] ? netlink_getsockopt+0x720/0x720 [ 2604.188543][T20531] ____sys_sendmsg+0x39a/0x510 [ 2604.193346][T20531] __sys_sendmsg+0x195/0x230 [ 2604.197935][T20531] __x64_sys_sendmsg+0x42/0x50 [ 2604.202911][T20531] do_syscall_64+0x44/0xd0 [ 2604.207330][T20531] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2604.213228][T20531] RIP: 0033:0x7f2f40028ae9 [ 2604.217672][T20531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2604.237425][T20531] RSP: 002b:00007f2f3f79f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2604.246038][T20531] RAX: ffffffffffffffda RBX: 00007f2f4013bf60 RCX: 00007f2f40028ae9 [ 2604.254005][T20531] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 2604.261980][T20531] RBP: 00007f2f3f79f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2604.269932][T20531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2604.277898][T20531] R13: 00007ffc5ea79eaf R14: 00007f2f3f79f300 R15: 0000000000022000 03:35:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 41) 03:35:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000002000)=""/4096, 0x1000}], 0xbb, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x10400, 0x0) 03:35:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_GROUP={0x8, 0x1b, 0xc3050000}]}, 0x28}}, 0x0) 03:35:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '@#\xbd%#<-\x00'}, &(0x7f00000004c0)=""/58, 0x3a) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.syz\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000003a40)=0x9, 0x4) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./file0\x00', &(0x7f0000000500)='ocfs2\x00', 0x80000, &(0x7f0000000700)='\x00') recvmsg(r1, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x20, 0x2, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x40840) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)=0x2) mknodat$null(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x66a78e1b74e44f22, 0x103) sendmsg$NFQNL_MSG_VERDICT(r1, &(0x7f0000000880)={&(0x7f0000000540), 0xc, &(0x7f0000000840)={&(0x7f0000000580)={0xf8, 0x1, 0x3, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFQA_CT={0x0, 0xb, 0x0, 0x1, [@CTA_TUPLE_MASTER={0x0, 0xe, 0x0, 0x1, [@CTA_TUPLE_PROTO={0x0, 0x2, 0x0, 0x1, {0x0, 0x1, 0x88}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @broadcast}, {0x0, 0x2, @local}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @remote}, {0x0, 0x2, @multicast2}}}]}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_CT={0xd4, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x74, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @loopback}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_V6_MAXIP={0x0, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @CTA_NAT_PROTO={0x24, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x32, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_V6_MINIP={0x0, 0x4, @mcast2}]}, @CTA_SYNPROXY={0x3c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x2}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x74}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x800}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_SYNPROXY_TSOFF={0x8}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x2, 0x6]}, @CTA_LABELS_MASK={0xc, 0x17, [0x2, 0x0]}, @CTA_TUPLE_MASTER={0x4}]}]}, 0xf8}}, 0x800) umount2(0x0, 0x4) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:35:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) (fail_nth: 16) [ 2604.285857][T20531] [ 2604.294724][T20531] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:35:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x40049409, &(0x7f0000000000)={0x1, 'vlan0\x00', {}, 0x73}) sendmsg$nl_route(r0, &(0x7f00000