[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 42.994326][ T26] audit: type=1800 audit(1570575208.819:25): pid=7090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 43.032723][ T26] audit: type=1800 audit(1570575208.819:26): pid=7090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 43.054261][ T26] audit: type=1800 audit(1570575208.819:27): pid=7090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.195' (ECDSA) to the list of known hosts. 2019/10/08 22:53:40 fuzzer started 2019/10/08 22:53:41 dialing manager at 10.128.0.105:35069 2019/10/08 22:53:41 syscalls: 2523 2019/10/08 22:53:41 code coverage: enabled 2019/10/08 22:53:41 comparison tracing: enabled 2019/10/08 22:53:41 extra coverage: extra coverage is not supported by the kernel 2019/10/08 22:53:41 setuid sandbox: enabled 2019/10/08 22:53:41 namespace sandbox: enabled 2019/10/08 22:53:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/08 22:53:41 fault injection: enabled 2019/10/08 22:53:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/08 22:53:41 net packet injection: enabled 2019/10/08 22:53:41 net device setup: enabled 2019/10/08 22:53:41 concurrency sanitizer: enabled 22:53:45 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x890c, 0x0) syzkaller login: [ 60.087585][ T7261] IPVS: ftp: loaded support on port[0] = 21 22:53:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) [ 60.174793][ T7261] chnl_net:caif_netlink_parms(): no params data found [ 60.225456][ T7261] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.232645][ T7261] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.241177][ T7261] device bridge_slave_0 entered promiscuous mode [ 60.250094][ T7261] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.257633][ T7261] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.266870][ T7261] device bridge_slave_1 entered promiscuous mode [ 60.292936][ T7261] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 60.303869][ T7261] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 60.328232][ T7261] team0: Port device team_slave_0 added [ 60.336426][ T7261] team0: Port device team_slave_1 added [ 60.395556][ T7261] device hsr_slave_0 entered promiscuous mode [ 60.462532][ T7261] device hsr_slave_1 entered promiscuous mode 22:53:46 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) [ 60.530771][ T7264] IPVS: ftp: loaded support on port[0] = 21 [ 60.545205][ T7261] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.552328][ T7261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.559734][ T7261] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.566824][ T7261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.706682][ T7261] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.807070][ T7261] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.823556][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.833983][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.867549][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.883981][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 60.899185][ T7264] chnl_net:caif_netlink_parms(): no params data found 22:53:46 executing program 3: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 60.931119][ T7269] IPVS: ftp: loaded support on port[0] = 21 [ 60.939062][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.947968][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.955155][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.970012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.987079][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.994308][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.080759][ T7264] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.101848][ T7264] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.109933][ T7264] device bridge_slave_0 entered promiscuous mode [ 61.150398][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.161012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.183983][ T7264] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.191330][ T7264] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.212746][ T7264] device bridge_slave_1 entered promiscuous mode [ 61.249323][ T7264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.283162][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.309575][ T7264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.333478][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.343651][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.353302][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.363468][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.374602][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 22:53:47 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, 0x0) [ 61.415891][ T7272] IPVS: ftp: loaded support on port[0] = 21 [ 61.433798][ T7264] team0: Port device team_slave_0 added [ 61.472383][ T7261] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.485846][ T7264] team0: Port device team_slave_1 added [ 61.614984][ T7264] device hsr_slave_0 entered promiscuous mode [ 61.682162][ T7264] device hsr_slave_1 entered promiscuous mode [ 61.721802][ T7264] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.748232][ T7269] chnl_net:caif_netlink_parms(): no params data found [ 61.757803][ T7279] IPVS: ftp: loaded support on port[0] = 21 [ 61.906070][ T7269] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.936265][ T7269] bridge0: port 1(bridge_slave_0) entered disabled state 22:53:47 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x890c, 0x0) 22:53:47 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x890c, 0x0) [ 61.967743][ T7269] device bridge_slave_0 entered promiscuous mode [ 62.064996][ T7269] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.082403][ T7269] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.090471][ T7269] device bridge_slave_1 entered promiscuous mode 22:53:48 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x890c, 0x0) [ 62.128437][ T7272] chnl_net:caif_netlink_parms(): no params data found [ 62.165720][ T7264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.210817][ T7269] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.230689][ T7264] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.232599][ T7289] IPVS: ftp: loaded support on port[0] = 21 [ 62.276483][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.292596][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.302267][ T7269] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:53:48 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x890c, 0x0) [ 62.352794][ T7269] team0: Port device team_slave_0 added [ 62.388576][ T7272] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.401996][ T7272] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.410023][ T7272] device bridge_slave_0 entered promiscuous mode [ 62.436742][ T7272] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.444084][ T7272] bridge0: port 2(bridge_slave_1) entered disabled state 22:53:48 executing program 0: capset(&(0x7f0000000040)={0x4000019980330}, &(0x7f0000000080)) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x0, 0x2}, 0x20) [ 62.452094][ T7272] device bridge_slave_1 entered promiscuous mode [ 62.460071][ T7269] team0: Port device team_slave_1 added [ 62.466594][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.476774][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.505304][ T7299] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) [ 62.515495][ T7267] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.522640][ T7267] bridge0: port 1(bridge_slave_0) entered forwarding state 22:53:48 executing program 0: capset(&(0x7f0000000040)={0x4000019980330}, &(0x7f0000000080)) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x0, 0x2}, 0x20) [ 62.573514][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.582795][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.591476][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.600292][ T7267] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.607467][ T7267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.616037][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.625436][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.657439][ T7264] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 22:53:48 executing program 0: capset(&(0x7f0000000040)={0x4000019980330}, &(0x7f0000000080)) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x0, 0x2}, 0x20) [ 62.670171][ T7264] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 62.715876][ T7269] device hsr_slave_0 entered promiscuous mode 22:53:48 executing program 0: capset(&(0x7f0000000040)={0x4000019980330}, &(0x7f0000000080)) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x0, 0x2}, 0x20) [ 62.772126][ T7269] device hsr_slave_1 entered promiscuous mode [ 62.811946][ T7269] debugfs: Directory 'hsr0' with parent '/' already present! [ 62.821452][ T7272] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.847168][ T7272] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.857085][ T7279] chnl_net:caif_netlink_parms(): no params data found [ 62.878591][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.887805][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.897445][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.911027][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.920283][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.929458][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.938076][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.946520][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.954979][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.963381][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 63.046501][ T7272] team0: Port device team_slave_0 added [ 63.054260][ T7264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.082316][ T7272] team0: Port device team_slave_1 added [ 63.105006][ T7279] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.115841][ T7279] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.124316][ T7279] device bridge_slave_0 entered promiscuous mode [ 63.144815][ T7279] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.154329][ T7279] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.164922][ T7279] device bridge_slave_1 entered promiscuous mode [ 63.179108][ T7289] chnl_net:caif_netlink_parms(): no params data found [ 63.224066][ T7272] device hsr_slave_0 entered promiscuous mode [ 63.262142][ T7272] device hsr_slave_1 entered promiscuous mode [ 63.301805][ T7272] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.343263][ T7279] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.358436][ T7279] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.436208][ T7289] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.444257][ T7289] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.457344][ T7289] device bridge_slave_0 entered promiscuous mode [ 63.475188][ T7279] team0: Port device team_slave_0 added [ 63.483823][ T7279] team0: Port device team_slave_1 added [ 63.502535][ T7289] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.510284][ T7289] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.523697][ T7289] device bridge_slave_1 entered promiscuous mode [ 63.540011][ T7269] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.562505][ C1] hrtimer: interrupt took 29621 ns [ 63.583558][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.592661][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.624033][ T7269] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.695258][ T7279] device hsr_slave_0 entered promiscuous mode [ 63.742328][ T7279] device hsr_slave_1 entered promiscuous mode 22:53:49 executing program 0: capset(&(0x7f0000000040)={0x4000019980330}, &(0x7f0000000080)) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x0, 0x2}, 0x20) [ 63.791918][ T7279] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.807913][ T7272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.824488][ T7289] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.836021][ T7289] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.848014][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.857485][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.866628][ T7267] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.873744][ T7267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.883466][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.892609][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.901664][ T7267] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.908860][ T7267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.918472][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.928075][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.947031][ T7269] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 63.961180][ T7269] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 63.979027][ T7272] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.004695][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.018090][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.026992][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.037798][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.047201][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.056524][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.065091][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.073757][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.082199][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.090436][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.098485][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.106690][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.115106][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 64.140571][ T7269] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.156350][ T7289] team0: Port device team_slave_0 added [ 64.167223][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.176845][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.186496][ T2878] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.193598][ T2878] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.214002][ T7289] team0: Port device team_slave_1 added [ 64.227144][ T7272] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 64.237837][ T7272] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 64.254890][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.263353][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.272484][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.281128][ T7284] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.288267][ T7284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.297487][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.306550][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.315440][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.324427][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.333551][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.342250][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.351009][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.359904][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.368857][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.377671][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.386603][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.395306][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 64.424411][ T7272] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.450763][ T7279] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.495041][ T7289] device hsr_slave_0 entered promiscuous mode [ 64.511746][ T7338] IPv6: addrconf: prefix option has invalid lifetime [ 64.529729][ T7289] device hsr_slave_1 entered promiscuous mode [ 64.591830][ T7289] debugfs: Directory 'hsr0' with parent '/' already present! [ 64.615064][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.623554][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.634770][ T7279] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.655433][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.666819][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.676780][ T7267] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.683916][ T7267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.710578][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.734992][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.744846][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.753963][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.761054][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.786220][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.799113][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.817190][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.837230][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.851291][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.870382][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.898374][ T7289] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.909931][ T7279] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 64.922343][ T7279] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 64.939712][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.967909][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.977383][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.988461][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.997810][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.013091][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.038277][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.048776][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.068962][ T7289] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.088538][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.105125][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.118530][ T7284] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.125755][ T7284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.135756][ T7279] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.144853][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.161536][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.172448][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.181161][ T7284] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.188312][ T7284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.197028][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.206451][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.221590][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.230613][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.248705][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.263871][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.281606][ T7289] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 65.300602][ T7289] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 65.318710][ T7394] IPv6: addrconf: prefix option has invalid lifetime [ 65.325579][ T7289] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.343504][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.357004][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.380501][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.394243][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 22:53:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:53:51 executing program 0: capset(&(0x7f0000000040)={0x4000019980330}, &(0x7f0000000080)) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x0, 0x2}, 0x20) 22:53:51 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, 0x0) 22:53:51 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x890c, 0x0) 22:53:51 executing program 3: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 22:53:51 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:51 executing program 0: capset(&(0x7f0000000040)={0x4000019980330}, &(0x7f0000000080)) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x0, 0x2}, 0x20) 22:53:51 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, 0x0) 22:53:51 executing program 3: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 22:53:52 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x890c, 0x0) 22:53:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:52 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, 0x0) 22:53:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:53:52 executing program 3: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 22:53:52 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) [ 66.420215][ T7440] IPv6: addrconf: prefix option has invalid lifetime 22:53:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) [ 66.951820][ T7468] IPv6: addrconf: prefix option has invalid lifetime 22:53:52 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:53:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) [ 67.158605][ T7474] IPv6: addrconf: prefix option has invalid lifetime [ 67.233043][ T7477] IPv6: addrconf: prefix option has invalid lifetime 22:53:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) [ 67.943657][ T7498] IPv6: addrconf: prefix option has invalid lifetime 22:53:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) [ 68.639471][ T7506] IPVS: ftp: loaded support on port[0] = 21 [ 68.820759][ T7506] chnl_net:caif_netlink_parms(): no params data found [ 68.852783][ T7506] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.860014][ T7506] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.868213][ T7506] device bridge_slave_0 entered promiscuous mode [ 68.909377][ T7506] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.916614][ T7506] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.924824][ T7506] device bridge_slave_1 entered promiscuous mode [ 68.943670][ T2659] device bridge_slave_1 left promiscuous mode [ 68.949961][ T2659] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.022362][ T2659] device bridge_slave_0 left promiscuous mode [ 69.028934][ T2659] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.902050][ T2659] device hsr_slave_0 left promiscuous mode [ 69.991939][ T2659] device hsr_slave_1 left promiscuous mode [ 70.049260][ T2659] team0 (unregistering): Port device team_slave_1 removed [ 70.061956][ T2659] team0 (unregistering): Port device team_slave_0 removed [ 70.074413][ T2659] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 70.137664][ T2659] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 70.200630][ T2659] bond0 (unregistering): Released all slaves [ 70.298524][ T7506] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.314599][ T7509] IPVS: ftp: loaded support on port[0] = 21 [ 70.323282][ T7506] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.374647][ T7506] team0: Port device team_slave_0 added [ 70.388086][ T7506] team0: Port device team_slave_1 added [ 70.444426][ T7506] device hsr_slave_0 entered promiscuous mode [ 70.482167][ T7506] device hsr_slave_1 entered promiscuous mode [ 70.531844][ T7506] debugfs: Directory 'hsr0' with parent '/' already present! [ 70.666802][ T7506] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.680313][ T7509] chnl_net:caif_netlink_parms(): no params data found [ 70.695711][ T7506] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.709093][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.717674][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.753711][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.763187][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.772375][ T2878] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.779494][ T2878] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.788076][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.797691][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.806846][ T2878] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.814552][ T2878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.823306][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.833176][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.861131][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.876392][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.887661][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.901464][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.928851][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.941133][ T7506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.961651][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.977682][ T7509] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.987352][ T7509] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.999454][ T7509] device bridge_slave_0 entered promiscuous mode [ 71.013688][ T7509] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.020816][ T7509] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.030776][ T7509] device bridge_slave_1 entered promiscuous mode [ 71.074340][ T7509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.092215][ T7506] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.107358][ T7509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.152609][ T7509] team0: Port device team_slave_0 added [ 71.160511][ T7509] team0: Port device team_slave_1 added [ 71.245458][ T7509] device hsr_slave_0 entered promiscuous mode [ 71.283128][ T7516] IPv6: addrconf: prefix option has invalid lifetime [ 71.302743][ T7509] device hsr_slave_1 entered promiscuous mode [ 71.361787][ T7509] debugfs: Directory 'hsr0' with parent '/' already present! [ 71.446966][ T7509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 71.464914][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 22:53:57 executing program 5: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 22:53:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:57 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) [ 71.499037][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.525894][ T7509] 8021q: adding VLAN 0 to HW filter on device team0 22:53:57 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 71.558516][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.589967][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.613715][ T2878] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.620916][ T2878] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.659978][ T7509] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 71.671531][ T7509] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 71.685316][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.694620][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.703933][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.713691][ T7284] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.720716][ T7284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.729408][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.738729][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.747958][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.756633][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.766236][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.775571][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.784956][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.795606][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.804878][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.813541][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.822512][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.831204][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.934717][ T7509] 8021q: adding VLAN 0 to HW filter on device batadv0 22:53:57 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 22:53:57 executing program 2: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 72.080838][ T7532] IPv6: addrconf: prefix option has invalid lifetime 22:53:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:53:58 executing program 0: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 73.359394][ T7543] IPVS: ftp: loaded support on port[0] = 21 [ 73.380606][ T7545] IPVS: ftp: loaded support on port[0] = 21 [ 73.381007][ T7546] IPVS: ftp: loaded support on port[0] = 21 [ 73.394548][ T7548] IPVS: ftp: loaded support on port[0] = 21 [ 73.414071][ T7544] IPVS: ftp: loaded support on port[0] = 21 [ 73.966013][ T7550] IPVS: ftp: loaded support on port[0] = 21 [ 74.476826][ T7544] chnl_net:caif_netlink_parms(): no params data found [ 74.706995][ T7546] chnl_net:caif_netlink_parms(): no params data found [ 74.765543][ T7545] chnl_net:caif_netlink_parms(): no params data found [ 74.785573][ T7543] chnl_net:caif_netlink_parms(): no params data found [ 74.804629][ T7544] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.811845][ T7544] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.819652][ T7544] device bridge_slave_0 entered promiscuous mode [ 74.830271][ T7544] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.837668][ T7544] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.845878][ T7544] device bridge_slave_1 entered promiscuous mode [ 75.066029][ T7548] chnl_net:caif_netlink_parms(): no params data found [ 75.300767][ T7546] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.308530][ T7546] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.317371][ T7546] device bridge_slave_0 entered promiscuous mode [ 75.331058][ T7546] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.338214][ T7546] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.346135][ T7546] device bridge_slave_1 entered promiscuous mode [ 75.377960][ T7544] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.424171][ T7543] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.431297][ T7543] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.439377][ T7543] device bridge_slave_0 entered promiscuous mode [ 75.449833][ T7544] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.470364][ T7545] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.477488][ T7545] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.486413][ T7545] device bridge_slave_0 entered promiscuous mode [ 75.496743][ T7546] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.690025][ T7543] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.698074][ T7543] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.712297][ T7543] device bridge_slave_1 entered promiscuous mode [ 75.740042][ T7548] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.752277][ T7548] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.760048][ T7548] device bridge_slave_0 entered promiscuous mode [ 75.768310][ T7545] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.775444][ T7545] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.783907][ T7545] device bridge_slave_1 entered promiscuous mode [ 75.792852][ T7546] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.829476][ T7548] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.836671][ T7548] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.850372][ T7548] device bridge_slave_1 entered promiscuous mode [ 75.871190][ T7544] team0: Port device team_slave_0 added [ 75.884294][ T2659] device bridge_slave_1 left promiscuous mode [ 75.890592][ T2659] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.955556][ T2659] device bridge_slave_0 left promiscuous mode [ 75.965946][ T2659] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.023560][ T2659] device bridge_slave_1 left promiscuous mode [ 76.029780][ T2659] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.082795][ T2659] device bridge_slave_0 left promiscuous mode [ 76.089187][ T2659] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.124010][ T2659] device bridge_slave_1 left promiscuous mode [ 76.130822][ T2659] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.182833][ T2659] device bridge_slave_0 left promiscuous mode [ 76.189275][ T2659] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.243091][ T2659] device bridge_slave_1 left promiscuous mode [ 76.249335][ T2659] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.332469][ T2659] device bridge_slave_0 left promiscuous mode [ 76.338703][ T2659] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.393411][ T2659] device bridge_slave_1 left promiscuous mode [ 76.399722][ T2659] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.452788][ T2659] device bridge_slave_0 left promiscuous mode [ 76.459100][ T2659] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.493552][ T2659] device bridge_slave_1 left promiscuous mode [ 76.499849][ T2659] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.542517][ T2659] device bridge_slave_0 left promiscuous mode [ 76.548714][ T2659] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.372187][ T2659] device hsr_slave_0 left promiscuous mode [ 81.411946][ T2659] device hsr_slave_1 left promiscuous mode [ 81.459958][ T2659] team0 (unregistering): Port device team_slave_1 removed [ 81.470775][ T2659] team0 (unregistering): Port device team_slave_0 removed [ 81.481599][ T2659] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 81.525583][ T2659] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 81.608926][ T2659] bond0 (unregistering): Released all slaves [ 81.752204][ T2659] device hsr_slave_0 left promiscuous mode [ 81.802059][ T2659] device hsr_slave_1 left promiscuous mode [ 81.861487][ T2659] team0 (unregistering): Port device team_slave_1 removed [ 81.873970][ T2659] team0 (unregistering): Port device team_slave_0 removed [ 81.884681][ T2659] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 81.935527][ T2659] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 82.018129][ T2659] bond0 (unregistering): Released all slaves [ 82.182131][ T2659] device hsr_slave_0 left promiscuous mode [ 82.224422][ T2659] device hsr_slave_1 left promiscuous mode [ 82.280298][ T2659] team0 (unregistering): Port device team_slave_1 removed [ 82.301541][ T2659] team0 (unregistering): Port device team_slave_0 removed [ 82.322422][ T2659] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 82.357196][ T2659] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 82.440704][ T2659] bond0 (unregistering): Released all slaves [ 82.562279][ T2659] device hsr_slave_0 left promiscuous mode [ 82.611905][ T2659] device hsr_slave_1 left promiscuous mode [ 82.661415][ T2659] team0 (unregistering): Port device team_slave_1 removed [ 82.673170][ T2659] team0 (unregistering): Port device team_slave_0 removed [ 82.683810][ T2659] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 82.735653][ T2659] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 82.818494][ T2659] bond0 (unregistering): Released all slaves [ 82.962229][ T2659] device hsr_slave_0 left promiscuous mode [ 83.001990][ T2659] device hsr_slave_1 left promiscuous mode [ 83.058769][ T2659] team0 (unregistering): Port device team_slave_1 removed [ 83.069640][ T2659] team0 (unregistering): Port device team_slave_0 removed [ 83.081885][ T2659] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 83.106776][ T2659] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 83.177959][ T2659] bond0 (unregistering): Released all slaves [ 83.342008][ T2659] device hsr_slave_0 left promiscuous mode [ 83.411956][ T2659] device hsr_slave_1 left promiscuous mode [ 83.461428][ T2659] team0 (unregistering): Port device team_slave_1 removed [ 83.472261][ T2659] team0 (unregistering): Port device team_slave_0 removed [ 83.483541][ T2659] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 83.546827][ T2659] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 83.630746][ T2659] bond0 (unregistering): Released all slaves [ 83.741460][ T7543] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.766126][ T7548] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.782168][ T7544] team0: Port device team_slave_1 added [ 83.793384][ T7546] team0: Port device team_slave_0 added [ 83.800772][ T7543] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.817907][ T7545] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.835017][ T7548] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.858470][ T7548] team0: Port device team_slave_0 added [ 83.864509][ T7550] chnl_net:caif_netlink_parms(): no params data found [ 83.875589][ T7546] team0: Port device team_slave_1 added [ 83.889259][ T7545] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.902081][ T7548] team0: Port device team_slave_1 added [ 84.004136][ T7544] device hsr_slave_0 entered promiscuous mode [ 84.062106][ T7544] device hsr_slave_1 entered promiscuous mode [ 84.113222][ T7543] team0: Port device team_slave_0 added [ 84.144084][ T7543] team0: Port device team_slave_1 added [ 84.224697][ T7546] device hsr_slave_0 entered promiscuous mode [ 84.282242][ T7546] device hsr_slave_1 entered promiscuous mode [ 84.331870][ T7546] debugfs: Directory 'hsr0' with parent '/' already present! [ 84.340562][ T7545] team0: Port device team_slave_0 added [ 84.347884][ T7545] team0: Port device team_slave_1 added [ 84.404836][ T7548] device hsr_slave_0 entered promiscuous mode [ 84.442402][ T7548] device hsr_slave_1 entered promiscuous mode [ 84.481917][ T7548] debugfs: Directory 'hsr0' with parent '/' already present! [ 84.527954][ T7550] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.535212][ T7550] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.543327][ T7550] device bridge_slave_0 entered promiscuous mode [ 84.584871][ T7545] device hsr_slave_0 entered promiscuous mode [ 84.622248][ T7545] device hsr_slave_1 entered promiscuous mode [ 84.661852][ T7545] debugfs: Directory 'hsr0' with parent '/' already present! [ 84.676280][ T7550] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.683533][ T7550] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.691597][ T7550] device bridge_slave_1 entered promiscuous mode [ 84.764381][ T7543] device hsr_slave_0 entered promiscuous mode [ 84.802112][ T7543] device hsr_slave_1 entered promiscuous mode [ 84.843238][ T7543] debugfs: Directory 'hsr0' with parent '/' already present! [ 84.898132][ T7544] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.936900][ T7544] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.947294][ T7550] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.963801][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.973020][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.988708][ T7550] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.014121][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.023149][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.032054][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.039120][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.047692][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.062379][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.071543][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.080271][ T7267] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.087675][ T7267] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.096546][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 85.122123][ T7550] team0: Port device team_slave_0 added [ 85.141828][ T7550] team0: Port device team_slave_1 added [ 85.152263][ T7543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.161580][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.202808][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 85.212407][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 85.234403][ T7546] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.295016][ T7550] device hsr_slave_0 entered promiscuous mode [ 85.332397][ T7550] device hsr_slave_1 entered promiscuous mode [ 85.371993][ T7550] debugfs: Directory 'hsr0' with parent '/' already present! [ 85.380038][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 85.388964][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 85.397902][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.406941][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.415798][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.424541][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.433170][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.443732][ T7544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 85.454221][ T7548] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.467799][ T7543] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.478518][ T7546] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.490058][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.498636][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.506620][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.514791][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.522774][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.531500][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.540193][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.547729][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.556471][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.567300][ T7545] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.580746][ T7548] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.599189][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.607546][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.615594][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.625654][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.634565][ T7284] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.641805][ T7284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.650110][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 85.659436][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.675886][ T7545] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.688462][ T7544] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 85.712399][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.721255][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.736039][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 85.745742][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 85.755431][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 85.765105][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.774760][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.783700][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.792389][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.801079][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.809952][ T7284] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.816996][ T7284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.825222][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.834191][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.842885][ T7284] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.849958][ T7284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.858155][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 85.867351][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 85.876588][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.885924][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.895304][ T7284] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.902401][ T7284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.910536][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.920570][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.929193][ T7284] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.936234][ T7284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.947536][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 85.956315][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.965070][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.978099][ T7546] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 86.048336][ T7548] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 86.059042][ T7548] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 86.074609][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 86.084113][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 86.095005][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.104488][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.113809][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.122882][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 86.132178][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 86.140722][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 86.149736][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 86.158382][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 86.166950][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 86.176182][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.184906][ T7267] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.191974][ T7267] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.200275][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 86.209103][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 86.217456][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 86.333855][ T7548] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.443208][ T7568] IPv6: addrconf: prefix option has invalid lifetime [ 86.462076][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.473235][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 86.484148][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.493252][ T7560] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.500344][ T7560] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.509139][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.588975][ T7550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.616854][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 86.647855][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.674264][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 86.703423][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 86.713854][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.736389][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 22:54:12 executing program 1: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 86.764468][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 86.792956][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 22:54:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) [ 86.828015][ T7545] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 86.871763][ T7545] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 86.898129][ T7550] 8021q: adding VLAN 0 to HW filter on device team0 [ 86.920624][ T7546] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.952659][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 86.963309][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 86.981112][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 87.006890][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 87.021477][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 87.046921][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 87.065671][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 87.150392][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 87.197385][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.237453][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.246378][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 87.255916][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 87.265277][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 87.274843][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 87.472276][ T7543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 87.491786][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 87.499797][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.510002][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.519862][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.526979][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.540895][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 87.572607][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 87.581489][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.588567][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.616656][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 87.626394][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 87.636462][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 87.645832][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 87.657437][ T7545] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 87.688971][ T7543] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 87.727616][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 87.743170][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 87.761806][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 87.770912][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 87.805853][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 87.824656][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 87.852978][ T7550] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 87.870253][ T7600] IPv6: addrconf: prefix option has invalid lifetime [ 87.882248][ T7550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 87.929196][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 87.941454][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 87.997756][ T7550] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 88.110670][ T7613] IPv6: addrconf: prefix option has invalid lifetime 22:54:14 executing program 5: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 22:54:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) [ 88.512177][ T7630] FAT-fs (loop2): bogus number of reserved sectors [ 88.567019][ T7630] FAT-fs (loop2): Can't find a valid FAT filesystem 22:54:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:14 executing program 0: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 22:54:14 executing program 1: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd607f81dd057f0000fe80000000000000000000000000000000000000000000000000ffffe0000002000000000000000005020000000000000008000000000000ff010000000000000000000000000001fe880000000000000000000000000001ff01000000000000000000000000000100000000000000000000ffffac1414bb00140000000000000103000000003fd6af6fb5496040ec3fbfcee02dc046bf41f6b203c89dc1e20cf57c26afd7f0ba0d901bfedf1deccad1ad15aaa6eef00df6bcb8a0cc2ae1db0107e256ad9f01040100c910ff01000000000000000000000000000100445c8edcc4001f2a6094f67fcb0099111b8df1c3acb034e60f144021218d86007caeeec04c049b3a6cef5e9e8ab2a9a722d604e300ee1ef57fc9c3526717542330a3a67bfd000000000000000002040100000000fe8000000000000000000000000000aa0000000000000000001c0000000000000740000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000000255502675e2355db906d875d681d6c83fbff7b50b2cc3c9683b973fc7b75d506b2119388115d071000000000020000000000000000000000c2040000000007280000000008000000000000000000000000000000000000000000000000000000000000000000000005020000050200000102000000000000000000000b000000000000075800000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030090780000000060af266d0000000000000000000000000000ffff0000000000000000000000000000ffff000000000008040400000000dca9351cc6f307458cd9fb5e518ab63cff020400000000000000000000000001fe8000000000000000000000000000bbff010000000000000000000000000001001600000000000000010004010005020000000100040100009f3af643d06a0a421eb71289619ebaf6433ec8ef95ee9b09321b8f750201c8d3af46f7e8d0b077992af9619c5ef009e593dbb0e087c770b795ce01c9caeafd0eedd209d9f1bd6283cf37cde132496e1843b99d3f80e0c08c10b66cc705c508f9d02c9c5fc9f747993105e2d7c3d880d076c74676899944e45d0e02798a5ea290939c5adfdd1d6cf2dc927fc668810f45efefb3442c7a5a9e52351cb03ea582e6000000000000000010040800000000ff020000000000000000000000000001ff010000000000000000000000000001fe800000000000000000000000000000a64d3cb2a7b617de64feb4df9d3fab71000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000604030000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000ffffffffffff000c000000000000000100040100c910fe880000000000000000000000000001c910fe800000000000000000000000000000c91077c29572ec5a7671ddae4a5e320a45ee0720000000000600000000000000000000000000000000000000000000000000000000010000000000000000000a000000000000fe80000000000000000000000000000000000000000000000000ffff7f000001ff010000000000000000000000000001fe8000000000000000000000000000aa00000000000000000000ffffffffffffc0ca705de1e04e01a7484dd362ccb5a6ef9a891605475de2426fda4ad199b433e381bf5173927500e0f87e804e609e7e0049ae580f0b5bb715c41b55eedd6d"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 22:54:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:54:14 executing program 5: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 22:54:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x800) ioctl$int_in(0xffffffffffffffff, 0x5473, &(0x7f0000000040)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) request_key(0x0, &(0x7f0000000480)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="0207000002000000000000000000000070bac7c17b77bc2c10ed2b1fc6aca225920b74c8075cdc17f1c85a963f978098a2"], 0x10}}, 0x0) 22:54:14 executing program 0: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 22:54:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) [ 90.760126][ T7691] IPVS: ftp: loaded support on port[0] = 21 [ 90.931813][ T7691] chnl_net:caif_netlink_parms(): no params data found [ 90.950711][ T7692] IPVS: ftp: loaded support on port[0] = 21 [ 91.010516][ T7691] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.017876][ T7691] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.027029][ T7691] device bridge_slave_0 entered promiscuous mode [ 91.037787][ T7691] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.045424][ T7691] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.053576][ T7691] device bridge_slave_1 entered promiscuous mode [ 91.086678][ T7691] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 91.098278][ T7691] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 91.124944][ T7691] team0: Port device team_slave_0 added [ 91.138253][ T7691] team0: Port device team_slave_1 added [ 91.225171][ T7692] chnl_net:caif_netlink_parms(): no params data found [ 91.274900][ T7691] device hsr_slave_0 entered promiscuous mode [ 91.322381][ T7691] device hsr_slave_1 entered promiscuous mode [ 91.371824][ T7691] debugfs: Directory 'hsr0' with parent '/' already present! [ 91.637602][ T7701] IPVS: ftp: loaded support on port[0] = 21 [ 91.663861][ T7692] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.671055][ T7692] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.679232][ T7692] device bridge_slave_0 entered promiscuous mode [ 91.689927][ T7692] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.697521][ T7692] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.705509][ T7692] device bridge_slave_1 entered promiscuous mode [ 91.731002][ T7692] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 91.856940][ T7692] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 91.898476][ T7692] team0: Port device team_slave_0 added [ 92.031650][ T7692] team0: Port device team_slave_1 added [ 92.056469][ T7691] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.245416][ T7692] device hsr_slave_0 entered promiscuous mode [ 92.282500][ T7692] device hsr_slave_1 entered promiscuous mode [ 92.321863][ T7692] debugfs: Directory 'hsr0' with parent '/' already present! [ 92.331288][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 92.482138][ T7691] 8021q: adding VLAN 0 to HW filter on device team0 [ 92.489767][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.498091][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.660424][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.669585][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.678115][ T7284] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.685186][ T7284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.694412][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.703003][ T7701] chnl_net:caif_netlink_parms(): no params data found [ 92.727821][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.736621][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.745716][ T7698] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.752781][ T7698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.762251][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 92.771350][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 92.780438][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 92.789078][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 92.798281][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 92.807260][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 92.816872][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.825476][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.834268][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.843006][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.976808][ T7691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 92.989874][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 93.147879][ T7691] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 93.157799][ T7701] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.171788][ T7701] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.180889][ T7701] device bridge_slave_0 entered promiscuous mode [ 93.192972][ T7701] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.200191][ T7701] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.208549][ T7701] device bridge_slave_1 entered promiscuous mode [ 93.369105][ T7692] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.379582][ T7701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 93.392677][ T7701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 93.416359][ T7701] team0: Port device team_slave_0 added [ 93.430757][ T2659] device bridge_slave_1 left promiscuous mode [ 93.439668][ T2659] bridge0: port 2(bridge_slave_1) entered disabled state 22:54:19 executing program 1: syz_emit_ethernet(0x5b5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0xc0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 22:54:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) [ 93.475802][ T2659] device bridge_slave_0 left promiscuous mode [ 93.495747][ T2659] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.553895][ T2659] device bridge_slave_1 left promiscuous mode [ 93.560168][ T2659] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.672465][ T2659] device bridge_slave_0 left promiscuous mode [ 93.679364][ T2659] bridge0: port 1(bridge_slave_0) entered disabled state 22:54:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) [ 93.794099][ T2659] device bridge_slave_1 left promiscuous mode [ 93.868098][ T2659] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.957671][ T2659] device bridge_slave_0 left promiscuous mode [ 93.971357][ T2659] bridge0: port 1(bridge_slave_0) entered disabled state 22:54:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) [ 94.053914][ T2659] device bridge_slave_1 left promiscuous mode [ 94.060195][ T2659] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.121932][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 94.127739][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 94.152369][ T2659] device bridge_slave_0 left promiscuous mode [ 94.158706][ T2659] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.201809][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 94.207613][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 94.521774][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 94.527601][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 97.602114][ T2659] device hsr_slave_0 left promiscuous mode [ 97.661963][ T2659] device hsr_slave_1 left promiscuous mode [ 97.710073][ T2659] team0 (unregistering): Port device team_slave_1 removed [ 97.723606][ T2659] team0 (unregistering): Port device team_slave_0 removed [ 97.736930][ T2659] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 97.785646][ T2659] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 97.869008][ T2659] bond0 (unregistering): Released all slaves [ 98.021971][ T2659] device hsr_slave_0 left promiscuous mode [ 98.092013][ T2659] device hsr_slave_1 left promiscuous mode [ 98.141726][ T2659] team0 (unregistering): Port device team_slave_1 removed [ 98.153799][ T2659] team0 (unregistering): Port device team_slave_0 removed [ 98.164610][ T2659] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 98.205911][ T2659] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 98.301722][ T2659] bond0 (unregistering): Released all slaves [ 98.442227][ T2659] device hsr_slave_0 left promiscuous mode [ 98.502101][ T2659] device hsr_slave_1 left promiscuous mode [ 98.580270][ T2659] team0 (unregistering): Port device team_slave_1 removed [ 98.595046][ T2659] team0 (unregistering): Port device team_slave_0 removed [ 98.607984][ T2659] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 98.636702][ T2659] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 98.709835][ T2659] bond0 (unregistering): Released all slaves [ 98.842246][ T2659] device hsr_slave_0 left promiscuous mode [ 98.881897][ T2659] device hsr_slave_1 left promiscuous mode [ 98.939300][ T2659] team0 (unregistering): Port device team_slave_1 removed [ 98.950980][ T2659] team0 (unregistering): Port device team_slave_0 removed [ 98.962863][ T2659] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 99.027143][ T2659] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 99.122853][ T2659] bond0 (unregistering): Released all slaves [ 99.236720][ T7701] team0: Port device team_slave_1 added [ 99.246859][ T7692] 8021q: adding VLAN 0 to HW filter on device team0 [ 99.258353][ T7735] bond0: (slave bond_slave_1): Releasing backup interface [ 99.474837][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 99.482782][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.506200][ T7736] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 99.554065][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 99.563606][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.572496][ T7284] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.579547][ T7284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.596725][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.609287][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.625632][ T7284] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.632874][ T7284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.649175][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 99.659244][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 99.675692][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 99.689319][ T7284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 99.764067][ T7701] device hsr_slave_0 entered promiscuous mode [ 99.812329][ T7701] device hsr_slave_1 entered promiscuous mode [ 99.897852][ T7692] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 99.908296][ T7692] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 99.922956][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 99.930952][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 99.939572][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 99.948655][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 99.958591][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 99.967220][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 99.975834][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 99.984431][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.006888][ T7698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 100.026644][ T7692] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 100.071271][ T7701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.090458][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.100779][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.117044][ T7701] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.271953][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.281033][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.290258][ T7560] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.297357][ T7560] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.306468][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.315573][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.324645][ T7560] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.331741][ T7560] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.340505][ T7560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.402298][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.417140][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.438365][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 22:54:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) 22:54:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:26 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) [ 100.449201][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.519818][ T7701] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 100.577000][ T7701] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 100.647941][ T7561] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 100.697873][ T7561] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 100.743782][ T7561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.762122][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 100.768030][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 100.785364][ T7561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.807085][ T7561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.848683][ T7769] bond0: (slave bond_slave_1): Releasing backup interface [ 100.911950][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 100.917956][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 101.031990][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 101.038095][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 101.081859][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 101.087688][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 101.152180][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 101.158203][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 101.489108][ T7777] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 101.565881][ T7561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.779826][ T7778] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 101.816446][ T7701] 8021q: adding VLAN 0 to HW filter on device batadv0 22:54:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) 22:54:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000500)=0x80, 0x12) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x20000, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x10, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$tipc(0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42800) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/234) 22:54:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) 22:54:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) 22:54:28 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 102.531130][ T7808] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 102.605020][ T7813] bond0: (slave bond_slave_1): Releasing backup interface 22:54:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) 22:54:28 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 103.136702][ T7814] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 22:54:29 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) [ 103.242214][ T7834] bond0: (slave bond_slave_1): Releasing backup interface 22:54:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) 22:54:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 103.985625][ T7846] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 22:54:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) 22:54:29 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) 22:54:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) [ 104.493401][ T7866] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 22:54:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) 22:54:30 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 104.957356][ T7886] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 22:54:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) 22:54:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) 22:54:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) 22:54:30 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:31 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) [ 105.442444][ T7914] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 22:54:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) [ 105.782658][ T7919] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 22:54:31 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:31 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) 22:54:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) 22:54:31 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) [ 106.207619][ T7939] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 106.251674][ T7940] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 22:54:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) socket$isdn_base(0x22, 0x3, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000400)=ANY=[@ANYBLOB="7aa39a67743712e49951f2307ebc287c2aba0f0c04d6627ab715c9174499c0afc7f7c84d11460de087b4bfaa0f638e1f532972b08e7b38350679deb2dc40a0bb329a071b7a2697e1aa88c4ff8a134a02ac285a26f985c56f0a41b028f3c54bd89f0d20d77b37f82f10db48ddb09752f9deeadad47383ac4ed4dcb4fd7443f4d7bf142787e5a368da242f8c7459c3f4537c136ba62fb6"], 0x6) fcntl$setstatus(r2, 0x4, 0x2000) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x13\x03\x03\xf0\x00', @ifru_mtu=0x1}) 22:54:32 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:32 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:32 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) [ 106.750317][ T7959] __nla_validate_parse: 1 callbacks suppressed [ 106.750335][ T7959] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 22:54:32 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) [ 106.791555][ T7966] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 106.818306][ T7965] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 22:54:32 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:32 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:33 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:33 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) [ 107.258984][ T7983] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 107.292763][ T7976] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 107.345221][ T7978] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 22:54:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) [ 107.391564][ T7991] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 107.455823][ T7992] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 107.549219][ T7995] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 107.653428][ T7999] bond0: (slave bond_slave_1): Releasing backup interface 22:54:33 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:33 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) 22:54:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) 22:54:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) [ 107.961747][ C1] net_ratelimit: 10 callbacks suppressed [ 107.961788][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 107.973714][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) [ 108.162631][ T8010] bond0: (slave bond_slave_1): Releasing backup interface [ 108.487030][ T8015] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 108.502586][ T8011] bond0: (slave bond_slave_1): Releasing backup interface 22:54:34 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) [ 108.682041][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 108.688524][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 108.694805][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 108.700747][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) [ 108.997095][ T8019] bond0: (slave bond_slave_1): Releasing backup interface [ 109.082036][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 109.087958][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:54:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) [ 109.401767][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 109.407676][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 109.412524][ T8016] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 22:54:35 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:35 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x28, r1, 0x5d13cd2d0d3daa79, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 22:54:35 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 22:54:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) 22:54:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) 22:54:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) 22:54:35 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) [ 110.119816][ T8061] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:54:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) [ 110.233317][ T8062] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:54:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x17}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) close(0xffffffffffffffff) socket$bt_hidp(0x1f, 0x3, 0x6) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x2040400) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="0000009700000000000000d4af208963a1fa2e09e9b756eff4e6124632cc6411bcfcf26c8033268125000000000000a21a23dfe945f5692ae8fc5af96719dd42350e442245fe9b11a2dac1f2d99c"], 0x4}}, 0x0) ptrace$cont(0x7, 0x0, 0x1, 0x4000000000000000) bind$packet(0xffffffffffffffff, 0x0, 0x0) 22:54:36 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 22:54:36 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 22:54:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 22:54:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "01ff075dc2a482fc0a332cae0d3b2712558774937c4533707a77b245c1b4f9cfcb1785b6ad82d5399b988110362a556c9dfdbad24233ec51e5f4a0fa6e4f24ef5159532b92611e4df64f2ee6b6912e857f770637608b6200401e33867ecb6e8226d9d2e8979e09ee35b47252ef070a15f1457eb357ee9f3e9ae3e2982c754920742acab964e5ce220dc1d5559244bf38f464e9d9d2f0f9bf514c1333de9ed39f6abe1d504cdb8119b3df2580939efca75ebf4fb98d11b2b2ffda46725e0a9854fdf2ccdcf16bbca61fc632470c56aa0284e89d3efe28b632969c3813f0d77d635b52025d993f4069439d1bbb322c5e2994f77bc3a2964fa36061f90eed"}) 22:54:36 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 22:54:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) [ 111.068526][ T8090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:54:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 22:54:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "01ff075dc2a482fc0a332cae0d3b2712558774937c4533707a77b245c1b4f9cfcb1785b6ad82d5399b988110362a556c9dfdbad24233ec51e5f4a0fa6e4f24ef5159532b92611e4df64f2ee6b6912e857f770637608b6200401e33867ecb6e8226d9d2e8979e09ee35b47252ef070a15f1457eb357ee9f3e9ae3e2982c754920742acab964e5ce220dc1d5559244bf38f464e9d9d2f0f9bf514c1333de9ed39f6abe1d504cdb8119b3df2580939efca75ebf4fb98d11b2b2ffda46725e0a9854fdf2ccdcf16bbca61fc632470c56aa0284e89d3efe28b632969c3813f0d77d635b52025d993f4069439d1bbb322c5e2994f77bc3a2964fa36061f90eed"}) 22:54:37 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:37 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 22:54:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:37 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x4, r0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 22:54:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:37 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:37 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:38 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000f7bf3e3782286c60dce8b868539fe410c29676e8188e10b02c93b22063cc3e6227b2b8315c3f4c4e08fbbf41251f41a41fb58903ec2c1f221307"], 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000040)={0x5, 0x2, 0x2, 0x7, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x1, 0x1}, 0x3c) 22:54:38 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:38 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000f7bf3e3782286c60dce8b868539fe410c29676e8188e10b02c93b22063cc3e6227b2b8315c3f4c4e08fbbf41251f41a41fb58903ec2c1f221307"], 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000040)={0x5, 0x2, 0x2, 0x7, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x1, 0x1}, 0x3c) 22:54:38 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:38 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000f7bf3e3782286c60dce8b868539fe410c29676e8188e10b02c93b22063cc3e6227b2b8315c3f4c4e08fbbf41251f41a41fb58903ec2c1f221307"], 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000040)={0x5, 0x2, 0x2, 0x7, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x1, 0x1}, 0x3c) 22:54:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, 0x2, {0x10000}}, 0x18) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x2) ioprio_set$pid(0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110005, 0x0, 0x8}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000001c0)=0x6) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}, 0x1110002, 0xffffffffffffffff}}}, 0x90) alarm(0x0) r5 = dup3(r1, r3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r6, 0xffffffffffffffff, 0x0) r7 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) fcntl$notify(r7, 0x402, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000002c0)={0xfd, 0x0, 0x3f, "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"}) 22:54:38 executing program 2: add_key(&(0x7f00000004c0)='rxrpc\x00', 0x0, &(0x7f0000000540)="8e13a4bc437f5940d4751e6cce376c1e6b9b924fcc393cdef2da0be00e199a02c350da2f2cd403809be052113e", 0xfffff, 0xfffffffffffffffc) 22:54:39 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000f7bf3e3782286c60dce8b868539fe410c29676e8188e10b02c93b22063cc3e6227b2b8315c3f4c4e08fbbf41251f41a41fb58903ec2c1f221307"], 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000040)={0x5, 0x2, 0x2, 0x7, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x1, 0x1}, 0x3c) 22:54:39 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000f7bf3e3782286c60dce8b868539fe410c29676e8188e10b02c93b22063cc3e6227b2b8315c3f4c4e08fbbf41251f41a41fb58903ec2c1f221307"], 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000040)={0x5, 0x2, 0x2, 0x7, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x1, 0x1}, 0x3c) 22:54:39 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) recvmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x2040) 22:54:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0x40047211, &(0x7f0000000280)) 22:54:39 executing program 2: add_key(&(0x7f00000004c0)='rxrpc\x00', 0x0, &(0x7f0000000540)="8e13a4bc437f5940d4751e6cce376c1e6b9b924fcc393cdef2da0be00e199a02c350da2f2cd403809be052113e", 0xfffff, 0xfffffffffffffffc) 22:54:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x24, 0x23, 0x829, 0x0, 0x0, {0x2804, 0xe00000000000000}, [@typed={0x10, 0x11, @str=':%/ime_type\x00'}]}, 0x24}, 0x1, 0x60}, 0x0) 22:54:39 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) recvmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x2040) 22:54:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0x40047211, &(0x7f0000000280)) 22:54:39 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000f7bf3e3782286c60dce8b868539fe410c29676e8188e10b02c93b22063cc3e6227b2b8315c3f4c4e08fbbf41251f41a41fb58903ec2c1f221307"], 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000040)={0x5, 0x2, 0x2, 0x7, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x1, 0x1}, 0x3c) 22:54:39 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001540)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004020000000000f7bf3e3782286c60dce8b868539fe410c29676e8188e10b02c93b22063cc3e6227b2b8315c3f4c4e08fbbf41251f41a41fb58903ec2c1f221307"], 0x0, 0x26}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000040)={0x5, 0x2, 0x2, 0x7, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x1, 0x1}, 0x3c) 22:54:39 executing program 2: add_key(&(0x7f00000004c0)='rxrpc\x00', 0x0, &(0x7f0000000540)="8e13a4bc437f5940d4751e6cce376c1e6b9b924fcc393cdef2da0be00e199a02c350da2f2cd403809be052113e", 0xfffff, 0xfffffffffffffffc) [ 113.771406][ T8229] sysfs: cannot create duplicate filename '/class/ieee80211/:%!ime_type' [ 113.830699][ T8229] CPU: 1 PID: 8229 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 113.838346][ T8229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.848681][ T8229] Call Trace: [ 113.852049][ T8229] dump_stack+0xf5/0x159 [ 113.856322][ T8229] sysfs_warn_dup.cold+0x1c/0x31 [ 113.861433][ T8229] sysfs_do_create_link_sd.isra.0+0x111/0x120 [ 113.867599][ T8229] sysfs_create_link+0x5c/0xa0 [ 113.872396][ T8229] device_add+0x514/0xcd0 [ 113.876849][ T8229] wiphy_register+0x1008/0x1590 [ 113.881854][ T8229] ? __kmalloc+0x239/0x690 [ 113.886389][ T8229] ? kobject_uevent_env+0x1f1/0xc00 [ 113.891641][ T8229] ? __kcsan_setup_watchpoint+0x96/0x510 [ 113.897317][ T8229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 113.903789][ T8229] ieee80211_register_hw+0xd22/0x1ec0 [ 113.909299][ T8229] mac80211_hwsim_new_radio+0x1427/0x1dd0 [ 113.915098][ T8229] ? kasprintf+0x74/0xa0 [ 113.919394][ T8229] ? __kcsan_setup_watchpoint+0x96/0x510 [ 113.925089][ T8229] hwsim_new_radio_nl+0x63d/0x890 22:54:39 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) recvmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x2040) [ 113.930280][ T8229] genl_family_rcv_msg+0x4ae/0x9f0 [ 113.935464][ T8229] genl_rcv_msg+0x8f/0x100 [ 113.939934][ T8229] netlink_rcv_skb+0xb0/0x260 [ 113.944676][ T8229] ? genl_family_rcv_msg+0x9f0/0x9f0 [ 113.950022][ T8229] genl_rcv+0x32/0x50 [ 113.954392][ T8229] netlink_unicast+0x354/0x430 [ 113.959275][ T8229] netlink_sendmsg+0x456/0x770 [ 113.964305][ T8229] ? aa_sock_msg_perm.isra.0+0xa5/0x140 [ 113.970634][ T8229] ? netlink_unicast+0x430/0x430 [ 113.975701][ T8229] sock_sendmsg+0x9f/0xc0 [ 113.980256][ T8229] ___sys_sendmsg+0x59d/0x5d0 [ 113.985210][ T8229] ? __tsan_write4+0x32/0x40 [ 113.989935][ T8229] ? __rcu_read_unlock+0x62/0xe0 [ 113.994940][ T8229] ? __fget+0xb8/0x1d0 [ 113.999135][ T8229] ? __kcsan_setup_watchpoint+0x96/0x510 [ 114.004797][ T8229] ? __fget_light+0xaf/0x190 [ 114.009502][ T8229] ? __tsan_write4+0x32/0x40 [ 114.014303][ T8229] __sys_sendmsg+0xa0/0x160 [ 114.019113][ T8229] __x64_sys_sendmsg+0x51/0x70 [ 114.023924][ T8229] do_syscall_64+0xcf/0x2f0 22:54:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0x40047211, &(0x7f0000000280)) 22:54:39 executing program 2: add_key(&(0x7f00000004c0)='rxrpc\x00', 0x0, &(0x7f0000000540)="8e13a4bc437f5940d4751e6cce376c1e6b9b924fcc393cdef2da0be00e199a02c350da2f2cd403809be052113e", 0xfffff, 0xfffffffffffffffc) [ 114.028551][ T8229] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 114.034546][ T8229] RIP: 0033:0x459a59 [ 114.038485][ T8229] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 114.058189][ T8229] RSP: 002b:00007ff3cc669c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 114.066739][ T8229] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 114.075268][ T8229] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 114.083317][ T8229] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 114.091327][ T8229] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3cc66a6d4 [ 114.099333][ T8229] R13: 00000000004c7baf R14: 00000000004dd938 R15: 00000000ffffffff 22:54:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0x40047211, &(0x7f0000000280)) 22:54:40 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) recvmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x2040) 22:54:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0x40047211, &(0x7f0000000280)) 22:54:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x24, 0x23, 0x829, 0x0, 0x0, {0x2804, 0xe00000000000000}, [@typed={0x10, 0x11, @str=':%/ime_type\x00'}]}, 0x24}, 0x1, 0x60}, 0x0) 22:54:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0x40047211, &(0x7f0000000280)) 22:54:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0x40047211, &(0x7f0000000280)) 22:54:40 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) recvmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x2040) [ 114.794956][ T8277] sysfs: cannot create duplicate filename '/class/ieee80211/:%!ime_type' [ 114.864023][ T8277] CPU: 0 PID: 8277 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 114.871557][ T8277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.881646][ T8277] Call Trace: [ 114.885077][ T8277] dump_stack+0xf5/0x159 [ 114.889356][ T8277] sysfs_warn_dup.cold+0x1c/0x31 [ 114.894429][ T8277] sysfs_do_create_link_sd.isra.0+0x111/0x120 [ 114.900676][ T8277] sysfs_create_link+0x5c/0xa0 [ 114.905523][ T8277] device_add+0x514/0xcd0 22:54:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0x40047211, &(0x7f0000000280)) [ 114.910028][ T8277] wiphy_register+0x1008/0x1590 [ 114.914928][ T8277] ? __kmalloc+0x239/0x690 [ 114.919460][ T8277] ? __kcsan_setup_watchpoint+0x96/0x510 [ 114.925230][ T8277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 114.931508][ T8277] ieee80211_register_hw+0xd22/0x1ec0 [ 114.937014][ T8277] mac80211_hwsim_new_radio+0x1427/0x1dd0 [ 114.943056][ T8277] ? kasprintf+0x74/0xa0 [ 114.947330][ T8277] ? __kcsan_setup_watchpoint+0x96/0x510 [ 114.953056][ T8277] hwsim_new_radio_nl+0x63d/0x890 [ 114.958232][ T8277] genl_family_rcv_msg+0x4ae/0x9f0 [ 114.963461][ T8277] genl_rcv_msg+0x8f/0x100 [ 114.967878][ T8277] netlink_rcv_skb+0xb0/0x260 [ 114.972555][ T8277] ? genl_family_rcv_msg+0x9f0/0x9f0 [ 114.977859][ T8277] genl_rcv+0x32/0x50 [ 114.981951][ T8277] netlink_unicast+0x354/0x430 [ 114.986795][ T8277] netlink_sendmsg+0x456/0x770 [ 114.991587][ T8277] ? aa_sock_msg_perm.isra.0+0xa5/0x140 [ 114.997131][ T8277] ? netlink_unicast+0x430/0x430 [ 115.002734][ T8277] sock_sendmsg+0x9f/0xc0 [ 115.007070][ T8277] ___sys_sendmsg+0x59d/0x5d0 [ 115.011772][ T8277] ? __tsan_write4+0x32/0x40 [ 115.016532][ T8277] ? __rcu_read_unlock+0x62/0xe0 [ 115.026035][ T8277] ? __fget+0xb8/0x1d0 [ 115.030141][ T8277] ? __kcsan_setup_watchpoint+0x96/0x510 [ 115.035804][ T8277] ? __fget_light+0xaf/0x190 [ 115.040446][ T8277] ? __tsan_write4+0x32/0x40 [ 115.045091][ T8277] __sys_sendmsg+0xa0/0x160 [ 115.049641][ T8277] __x64_sys_sendmsg+0x51/0x70 [ 115.054954][ T8277] do_syscall_64+0xcf/0x2f0 [ 115.059548][ T8277] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.065473][ T8277] RIP: 0033:0x459a59 [ 115.069422][ T8277] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 115.089835][ T8277] RSP: 002b:00007ff3cc68ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 115.098292][ T8277] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 115.106270][ T8277] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 22:54:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$FITRIM(r2, 0x40047211, &(0x7f0000000280)) [ 115.114250][ T8277] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 115.122233][ T8277] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff3cc68b6d4 [ 115.130254][ T8277] R13: 00000000004c7baf R14: 00000000004dd938 R15: 00000000ffffffff [ 115.246937][ T7636] ================================================================== [ 115.255065][ T7636] BUG: KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor [ 115.263065][ T7636] [ 115.265762][ T7636] write to 0xffffffff860bff28 of 8 bytes by task 7548 on cpu 1: [ 115.273908][ T7636] tomoyo_supervisor+0x1ec/0xd20 [ 115.278831][ T7636] tomoyo_path_permission+0x121/0x160 [ 115.284187][ T7636] tomoyo_path_perm+0x23e/0x390 [ 115.289021][ T7636] tomoyo_inode_getattr+0x26/0x40 [ 115.294385][ T7636] security_inode_getattr+0x9b/0xd0 [ 115.299566][ T7636] vfs_getattr+0x2e/0x70 [ 115.303880][ T7636] vfs_statx+0x102/0x190 [ 115.308114][ T7636] __do_sys_newlstat+0x51/0xb0 [ 115.312864][ T7636] __x64_sys_newlstat+0x3a/0x50 [ 115.317711][ T7636] do_syscall_64+0xcf/0x2f0 [ 115.322206][ T7636] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.328074][ T7636] [ 115.330389][ T7636] write to 0xffffffff860bff28 of 8 bytes by task 7636 on cpu 0: [ 115.338012][ T7636] tomoyo_supervisor+0x1ec/0xd20 [ 115.342938][ T7636] tomoyo_path_permission+0x121/0x160 [ 115.348390][ T7636] tomoyo_path_perm+0x23e/0x390 [ 115.353231][ T7636] tomoyo_inode_getattr+0x26/0x40 [ 115.358262][ T7636] security_inode_getattr+0x9b/0xd0 [ 115.363452][ T7636] vfs_getattr+0x2e/0x70 [ 115.367679][ T7636] vfs_statx+0x102/0x190 [ 115.371913][ T7636] __do_sys_newstat+0x51/0xb0 [ 115.376599][ T7636] __x64_sys_newstat+0x3a/0x50 [ 115.381370][ T7636] do_syscall_64+0xcf/0x2f0 [ 115.385872][ T7636] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.391901][ T7636] [ 115.394217][ T7636] Reported by Kernel Concurrency Sanitizer on: [ 115.400376][ T7636] CPU: 0 PID: 7636 Comm: udevd Not tainted 5.3.0+ #0 [ 115.407031][ T7636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.417079][ T7636] ================================================================== [ 115.426341][ T7636] Kernel panic - not syncing: panic_on_warn set ... [ 115.432917][ T7636] CPU: 0 PID: 7636 Comm: udevd Not tainted 5.3.0+ #0 [ 115.439568][ T7636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.449973][ T7636] Call Trace: [ 115.453264][ T7636] dump_stack+0xf5/0x159 [ 115.457506][ T7636] panic+0x209/0x639 [ 115.462172][ T7636] ? __x64_sys_newstat+0x3a/0x50 [ 115.467109][ T7636] ? vprintk_func+0x8d/0x140 [ 115.471702][ T7636] kcsan_report.cold+0xc/0x1b [ 115.476478][ T7636] __kcsan_setup_watchpoint+0x3ee/0x510 [ 115.482012][ T7636] __tsan_write8+0x32/0x40 [ 115.486416][ T7636] tomoyo_supervisor+0x1ec/0xd20 [ 115.491688][ T7636] ? __kcsan_setup_watchpoint+0x96/0x510 [ 115.497399][ T7636] ? __kcsan_setup_watchpoint+0x96/0x510 [ 115.503030][ T7636] ? __tsan_write1+0x32/0x40 [ 115.507610][ T7636] ? tomoyo_compare_name_union+0xa0/0xa0 [ 115.513321][ T7636] tomoyo_path_permission+0x121/0x160 [ 115.518700][ T7636] tomoyo_path_perm+0x23e/0x390 [ 115.523566][ T7636] tomoyo_inode_getattr+0x26/0x40 [ 115.528589][ T7636] security_inode_getattr+0x9b/0xd0 [ 115.533782][ T7636] vfs_getattr+0x2e/0x70 [ 115.538014][ T7636] vfs_statx+0x102/0x190 [ 115.542247][ T7636] __do_sys_newstat+0x51/0xb0 [ 115.546912][ T7636] ? __kcsan_setup_watchpoint+0x96/0x510 [ 115.552530][ T7636] ? __kcsan_setup_watchpoint+0x96/0x510 [ 115.558149][ T7636] ? __kcsan_setup_watchpoint+0x96/0x510 [ 115.563777][ T7636] ? __kcsan_setup_watchpoint+0x96/0x510 [ 115.569394][ T7636] ? __tsan_read8+0x2c/0x30 [ 115.573890][ T7636] __x64_sys_newstat+0x3a/0x50 [ 115.578646][ T7636] do_syscall_64+0xcf/0x2f0 [ 115.583143][ T7636] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.589017][ T7636] RIP: 0033:0x7f55d3f17c65 [ 115.593858][ T7636] Code: 00 00 00 e8 5d 01 00 00 48 83 c4 18 c3 90 90 90 90 90 90 90 90 83 ff 01 48 89 f0 77 18 48 89 c7 48 89 d6 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 17 f3 c3 90 48 8b 05 a1 51 2b 00 64 c7 00 16 [ 115.613449][ T7636] RSP: 002b:00007ffebd366018 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 115.621860][ T7636] RAX: ffffffffffffffda RBX: 0000000000000703 RCX: 00007f55d3f17c65 [ 115.629828][ T7636] RDX: 00007ffebd366080 RSI: 00007ffebd366080 RDI: 00007ffebd366910 [ 115.637798][ T7636] RBP: 00000000000003e9 R08: 0000000001ec2eb0 R09: 00007f55d3f6e3d0 [ 115.645766][ T7636] R10: 7269762f73656369 R11: 0000000000000246 R12: 0000000001ec2eb0 [ 115.653726][ T7636] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000001ed7c99 [ 115.663072][ T7636] Kernel Offset: disabled [ 115.667419][ T7636] Rebooting in 86400 seconds..