002c0007800800040001000000080004005a00008008000200010000000a00020001000100080002000d0200004c00078008000400330d0000080001000e000000080002000000000008000300ff000000080004000800000008000300ffffffff080001001600000008000100200000000800030000040000f400ab488a3bd6379bc8788c2d35abff04801300010062726f6164636173542d6c696e6b00000900010073797a30000000003c00078008000400b2"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:07:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x8, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a}, 0x1c) 21:07:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0x2, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) [ 1591.118924][T21967] device bond64 entered promiscuous mode 21:07:37 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x8000d5, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040014d79cd2000066617400040409000200027400f8", 0x16}], 0x0, &(0x7f0000000280)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x188c5, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5", 0x57) sendfile(r0, r1, 0x0, 0xee000000) [ 1591.172126][T21967] 8021q: adding VLAN 0 to HW filter on device bond64 [ 1591.203132][T22006] bond64: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1591.245172][T22006] bond64: (slave ip6tnl1): Error -95 calling set_mac_address [ 1591.307977][T22030] FAT-fs (loop3): bogus number of FAT sectors [ 1591.320714][T22030] FAT-fs (loop3): Can't find a valid FAT filesystem 21:07:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0x47f}]}) 21:07:37 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f000000080001001100000008000300b7000000080001000b00000008000100060000001300010062726f6164636173742d6c696e6b00004400e68008000300070000000800030200010000800800040001040000080001001c00000008000200f504000008000200faffffff08000400010001001300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003400078008000200fcffffff08000200ff01000008000200090000000800010012000000080001001500000008000100030000002c0007800800040001000000080004005a00008008000200010000000a00020001000100080002000d0200004c00078008000400330d0000080001000e000000080002000000000008000300ff000000080004000800000008000300ffffffff080001001600000008000100200000000800030000040000f400ab488a3bd6379bc8788c2d35abff04801300010062726f6164636173542d6c696e6b000009"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) [ 1591.626846][T22030] FAT-fs (loop3): bogus number of FAT sectors [ 1591.640276][T22030] FAT-fs (loop3): Can't find a valid FAT filesystem 21:07:37 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000340)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) [ 1591.921224][T22060] device bond65 entered promiscuous mode [ 1591.931463][T22060] 8021q: adding VLAN 0 to HW filter on device bond65 [ 1591.955146][T22083] bond65: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1591.968745][T22083] bond65: (slave ip6tnl1): Error -95 calling set_mac_address 21:07:40 executing program 4: semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000400)) 21:07:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0x2, &(0x7f0000000100)) 21:07:40 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000001a40)={'syztnl0\x00', &(0x7f00000019c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @private1}}) 21:07:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, 0xffffffffffffffff) fcntl$setown(r3, 0x8, r0) tkill(r0, 0x16) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:07:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005e7ffffff000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000900010076"], 0x48}}, 0x0) 21:07:40 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f000000080001001100000008000300b7000000080001000b00000008000100060000001300010062726f6164636173742d6c696e6b00004400e68008000300070000000800030200010000800800040001040000080001001c00000008000200f504000008000200faffffff08000400010001001300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003400078008000200fcffffff08000200ff01000008000200090000000800010012000000080001001500000008000100030000002c0007800800040001000000080004005a00008008000200010000000a00020001000100080002000d0200004c00078008000400330d0000080001000e000000080002000000000008000300ff000000080004000800000008000300ffffffff080001001600000008000100200000000800030000040000f400ab488a3bd6379bc8788c2d35abff048013"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:07:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) timer_settime(0x0, 0x1c7cb7b2ad992ec3, &(0x7f00000000c0)={{0x0, 0x3938700}}, &(0x7f00000001c0)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000380)={0x0, 'batadv0\x00', {}, 0x9}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005e7ffffff000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) socket$inet6(0xa, 0x3, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=@newtfilter={0x478, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xb}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x448, 0x2, [@TCA_RSVP_POLICE={0x444, 0x5, [@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x3f, 0x0, 0x0, 0x0, 0x0, 0x6}}}]}]}}]}, 0x478}}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x80400, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 1594.031863][T22116] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 21:07:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x400) [ 1594.261583][T22121] device bond66 entered promiscuous mode [ 1594.302707][T22121] 8021q: adding VLAN 0 to HW filter on device bond66 [ 1594.358057][T22133] bond66: (slave ip6tnl1): The slave device specified does not support setting the MAC address 21:07:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000400000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000eaffffff000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}], 0x0, &(0x7f00000002c0)) [ 1594.422268][T22133] bond66: (slave ip6tnl1): Error -95 calling set_mac_address [ 1594.865396][T22155] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 21:07:41 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f000000080001001100000008000300b7000000080001000b00000008000100060000001300010062726f6164636173742d6c696e6b00004400e68008000300070000000800030200010000800800040001040000080001001c00000008000200f504000008000200faffffff08000400010001001300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003400078008000200fcffffff08000200ff01000008000200090000000800010012000000080001001500000008000100030000002c0007800800040001000000080004005a00008008000200010000000a00020001000100080002000d0200004c00078008000400330d0000080001000e000000080002000000000008000300ff000000080004000800000008000300ffffffff080001001600000008000100200000000800030000040000f400ab488a3bd6379bc8788c2d35abff048013"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:07:41 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000001080)=ANY=[], 0x37cb1133) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x48002) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) [ 1594.943726][T22134] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 21:07:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000180)="0503000006003e0000000d00c52cf7c25975e605b02f86ddeb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0xea010000, 0x0, 0x0) 21:07:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="000000020002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000040)) 21:07:41 executing program 3: rt_sigaction(0x21, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000500)) [ 1595.169979][T22194] device bond67 entered promiscuous mode [ 1595.185423][T22194] 8021q: adding VLAN 0 to HW filter on device bond67 21:07:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000080)={0xf, 0x2}) [ 1595.212501][T22225] bond67: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1595.225683][T22225] bond67: (slave ip6tnl1): Error -95 calling set_mac_address 21:07:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, 0xffffffffffffffff) fcntl$setown(r3, 0x8, r0) tkill(r0, 0x16) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:07:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x8000d5, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040014d79cd2000066617400040409000200027400f8", 0x16}], 0x0, &(0x7f0000000280)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x188c5, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d8", 0xbe) sendfile(r0, r1, 0x0, 0xee000000) 21:07:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r4, 0xc008ae91, 0x0) 21:07:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80008, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="000000020002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000eaffffff000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x2000481, &(0x7f00000002c0)) 21:07:43 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:07:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr(r2, &(0x7f0000000140)=@known='security.apparmor\x00', 0x0, 0x0, 0x0) [ 1597.185300][T22258] FAT-fs (loop1): bogus number of FAT sectors [ 1597.191589][T22258] FAT-fs (loop1): Can't find a valid FAT filesystem 21:07:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005e7ffffff000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=@newtfilter={0x478, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xb}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x448, 0x2, [@TCA_RSVP_POLICE={0x444, 0x5, [@TCA_POLICE_RATE={0x404}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x3f, 0x0, 0x0, 0x0, 0x0, 0x6}}}]}]}}]}, 0x478}}, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000200), 0x4924924924926d3, 0x0) 21:07:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x8008aef3, &(0x7f0000000040)) [ 1597.488694][T22264] device bond68 entered promiscuous mode [ 1597.499236][T22258] FAT-fs (loop1): bogus number of FAT sectors [ 1597.569176][T22264] 8021q: adding VLAN 0 to HW filter on device bond68 [ 1597.584019][T22258] FAT-fs (loop1): Can't find a valid FAT filesystem 21:07:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, 0x0) [ 1597.632281][T22286] bond68: (slave ip6tnl1): The slave device specified does not support setting the MAC address 21:07:43 executing program 4: futex(&(0x7f0000000400), 0x3, 0x0, 0x0, &(0x7f00000004c0), 0x0) [ 1597.704784][T22286] bond68: (slave ip6tnl1): Error -95 calling set_mac_address 21:07:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x8000d5, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040014d79cd2000066617400040409000200027400f8", 0x16}], 0x0, &(0x7f0000000280)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x188c5, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c3", 0x2e7) sendfile(r0, r1, 0x0, 0xee000000) 21:07:44 executing program 4: [ 1598.215267][T22325] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1598.273920][T22328] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 21:07:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(0xffffffffffffffff, 0x8, r0) tkill(r0, 0x16) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:07:46 executing program 4: 21:07:46 executing program 1: 21:07:46 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:07:46 executing program 2: 21:07:46 executing program 3: 21:07:46 executing program 1: 21:07:46 executing program 4: 21:07:46 executing program 3: 21:07:46 executing program 2: 21:07:46 executing program 1: [ 1600.465364][T22364] device bond69 entered promiscuous mode [ 1600.494319][T22364] 8021q: adding VLAN 0 to HW filter on device bond69 21:07:46 executing program 4: [ 1600.539979][T22380] bond69: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1600.612331][T22380] bond69: (slave ip6tnl1): Error -95 calling set_mac_address 21:07:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(0xffffffffffffffff, 0x8, r0) tkill(r0, 0x16) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:07:49 executing program 2: 21:07:49 executing program 3: 21:07:49 executing program 1: 21:07:49 executing program 4: 21:07:49 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:07:49 executing program 3: 21:07:49 executing program 4: 21:07:49 executing program 2: 21:07:49 executing program 1: [ 1603.499880][T22425] device bond70 entered promiscuous mode [ 1603.510778][T22425] 8021q: adding VLAN 0 to HW filter on device bond70 [ 1603.556281][T22447] bond70: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1603.578989][T22447] bond70: (slave ip6tnl1): Error -95 calling set_mac_address 21:07:49 executing program 2: 21:07:49 executing program 4: 21:07:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(0xffffffffffffffff, 0x8, r0) tkill(r0, 0x16) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:07:52 executing program 3: 21:07:52 executing program 1: 21:07:52 executing program 2: 21:07:52 executing program 4: 21:07:52 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:07:52 executing program 2: 21:07:52 executing program 3: 21:07:52 executing program 4: [ 1606.571022][T22486] device bond71 entered promiscuous mode [ 1606.577206][T22486] 8021q: adding VLAN 0 to HW filter on device bond71 [ 1606.650215][T22518] bond71: (slave ip6tnl1): The slave device specified does not support setting the MAC address 21:07:52 executing program 1: [ 1606.773476][T22518] bond71: (slave ip6tnl1): Error -95 calling set_mac_address 21:07:53 executing program 2: 21:07:53 executing program 4: 21:07:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(r3, 0x8, 0x0) tkill(r0, 0x16) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:07:55 executing program 3: 21:07:55 executing program 1: 21:07:55 executing program 2: 21:07:55 executing program 4: 21:07:55 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:07:55 executing program 1: 21:07:55 executing program 2: 21:07:55 executing program 4: [ 1609.786042][T22547] device bond72 entered promiscuous mode [ 1609.799177][T22547] 8021q: adding VLAN 0 to HW filter on device bond72 21:07:56 executing program 1: 21:07:56 executing program 3: [ 1609.853394][T22572] bond72: (slave ip6tnl1): The slave device specified does not support setting the MAC address 21:07:56 executing program 2: [ 1609.952418][T22572] bond72: (slave ip6tnl1): Error -95 calling set_mac_address 21:07:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(r3, 0x8, 0x0) tkill(r0, 0x16) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:07:58 executing program 1: 21:07:58 executing program 4: 21:07:58 executing program 3: 21:07:58 executing program 2: 21:07:58 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:07:59 executing program 3: 21:07:59 executing program 2: [ 1612.871209][T22608] device bond73 entered promiscuous mode [ 1612.885418][T22608] 8021q: adding VLAN 0 to HW filter on device bond73 21:07:59 executing program 1: 21:07:59 executing program 4: [ 1612.942779][T22630] bond73: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1613.058940][T22630] bond73: (slave ip6tnl1): Error -95 calling set_mac_address 21:07:59 executing program 2: 21:07:59 executing program 4: 21:08:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(r3, 0x8, 0x0) tkill(r0, 0x16) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:08:02 executing program 3: 21:08:02 executing program 1: 21:08:02 executing program 4: 21:08:02 executing program 2: 21:08:02 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:02 executing program 2: 21:08:02 executing program 3: [ 1616.082999][T22671] device bond74 entered promiscuous mode [ 1616.091194][T22671] 8021q: adding VLAN 0 to HW filter on device bond74 21:08:02 executing program 4: [ 1616.151212][T22699] bond74: (slave ip6tnl1): The slave device specified does not support setting the MAC address 21:08:02 executing program 1: [ 1616.274795][T22699] bond74: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:02 executing program 2: 21:08:02 executing program 3: 21:08:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(r3, 0x8, r0) tkill(0x0, 0x16) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:08:05 executing program 2: 21:08:05 executing program 1: 21:08:05 executing program 4: 21:08:05 executing program 3: 21:08:05 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:05 executing program 4: 21:08:05 executing program 3: 21:08:05 executing program 2: 21:08:05 executing program 1: 21:08:05 executing program 1: 21:08:05 executing program 3: [ 1619.351042][T22735] device bond75 entered promiscuous mode [ 1619.371474][T22735] 8021q: adding VLAN 0 to HW filter on device bond75 [ 1619.419723][T22740] bond75: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1619.461087][T22740] bond75: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(r3, 0x8, r0) tkill(0x0, 0x16) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:08:06 executing program 2: 21:08:06 executing program 4: 21:08:06 executing program 3: 21:08:06 executing program 1: 21:08:06 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:06 executing program 4: [ 1620.151490][T22796] device bond76 entered promiscuous mode [ 1620.158086][T22796] 8021q: adding VLAN 0 to HW filter on device bond76 21:08:06 executing program 3: 21:08:06 executing program 1: 21:08:06 executing program 2: [ 1620.274743][T22831] bond76: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1620.388441][T22831] bond76: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:06 executing program 4: 21:08:06 executing program 3: 21:08:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(r3, 0x8, r0) tkill(0x0, 0x16) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:08:07 executing program 2: 21:08:07 executing program 1: 21:08:07 executing program 4: 21:08:07 executing program 3: 21:08:07 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:07 executing program 1: [ 1621.196102][T22858] device bond77 entered promiscuous mode [ 1621.209285][T22858] 8021q: adding VLAN 0 to HW filter on device bond77 21:08:07 executing program 2: 21:08:07 executing program 3: 21:08:07 executing program 4: [ 1621.237132][T22884] bond77: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1621.334229][T22884] bond77: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:07 executing program 2: 21:08:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x1279, 0xffffffffffffffff) 21:08:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(r3, 0x8, r0) tkill(r0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:08:08 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x602) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 21:08:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000200)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @empty}}) 21:08:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x1a, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:08:08 executing program 1: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000001580), 0x0, 0x0) syz_mount_image$exfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000001a80), 0x0, 0x0) 21:08:08 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 21:08:08 executing program 4: r0 = socket(0xa, 0x3, 0x3a) sendmmsg$unix(r0, &(0x7f0000001780)=[{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000100)="56eaa18f13be6f7d15a43bfe832a88fb4ced47f3692cb8c63aa10ee378fa25f96a3db10b042b6676e51fccf134b66f77b63efbb5", 0x34}], 0x1}], 0x2, 0x0) 21:08:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x20}, 0x20}}, 0x0) [ 1622.241014][T22921] device bond78 entered promiscuous mode [ 1622.281042][T22921] 8021q: adding VLAN 0 to HW filter on device bond78 21:08:08 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x2, &(0x7f00000002c0)={0x6, {{0x2, 0x0, @multicast2}}}, 0x3) [ 1622.325796][T22946] bond78: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1622.339161][T22946] bond78: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 21:08:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x400000ff}]}) 21:08:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(r3, 0x8, r0) tkill(r0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:08:09 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000003900)={'batadv0\x00'}) 21:08:09 executing program 2: sendto$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 21:08:09 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:09 executing program 3: r0 = socket(0xa, 0x1, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x40440d5) 21:08:09 executing program 1: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x8040, 0x0) 21:08:09 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x894b, &(0x7f0000003900)={'batadv0\x00'}) 21:08:09 executing program 4: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 21:08:09 executing program 2: r0 = socket(0x18, 0x0, 0x2) bind$isdn(r0, 0x0, 0x0) [ 1623.228258][T23002] device bond79 entered promiscuous mode 21:08:09 executing program 3: r0 = socket(0x11, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000180)) [ 1623.293852][T23002] 8021q: adding VLAN 0 to HW filter on device bond79 [ 1623.377549][T23020] bond79: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1623.467061][T23020] bond79: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:09 executing program 1: r0 = socket(0x15, 0x5, 0x0) bind$unix(r0, 0x0, 0x0) 21:08:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x40000000}]}) 21:08:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000003240), 0x252da778b17d5c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x18, 0x0, 0x48) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000000c0), 0x4) tkill(0x0, 0x2e) ioctl$int_in(r3, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r3, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r4}], 0x2c, 0xffffffffffbffff8) dup2(r3, r4) fcntl$setown(r3, 0x8, r0) tkill(r0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 21:08:10 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x84fb, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f00000019c0)=[&(0x7f0000000140)={0x0, 0x0, 0x3f000000, 0x0, 0x0, r0, 0x0}]) 21:08:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x6e0}]}) 21:08:10 executing program 1: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x22, 0x0, 0x0) 21:08:10 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x258}]}) 21:08:10 executing program 2: r0 = socket(0xa, 0x3, 0x1) connect$netrom(r0, 0x0, 0x0) 21:08:10 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x4, 0x0, 0x0) [ 1624.361943][T23075] device bond80 entered promiscuous mode [ 1624.429626][T23075] 8021q: adding VLAN 0 to HW filter on device bond80 21:08:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000300)={0xf, 0x8}, 0x10) [ 1624.499721][T23088] bond80: (slave ip6tnl1): The slave device specified does not support setting the MAC address 21:08:10 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8981, &(0x7f0000003900)={'batadv0\x00'}) 21:08:10 executing program 2: ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000000)) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmat(r0, &(0x7f0000802000/0x4000)=nil, 0x6800) shmat(r0, &(0x7f0000cea000/0x2000)=nil, 0x6000) [ 1624.587190][T23088] bond80: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:10 executing program 4: r0 = socket(0x11, 0x803, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0, 0x50}}, 0x0) 21:08:11 executing program 1: r0 = socket(0x2c, 0x3, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x11b, 0x7, 0x0, 0x0) 21:08:11 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000140)={'ip6tnl0\x00'}) 21:08:11 executing program 5: setreuid(0x0, 0xee01) socket(0x25, 0x0, 0x0) 21:08:11 executing program 3: syz_mount_image$jffs2(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', &(0x7f0000000300), 0x18) utimensat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 21:08:11 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x47f}]}) [ 1625.281845][T23153] ip6tnl0: mtu less than device minimum 21:08:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000003fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x5e}}], 0x2, 0x0, 0x0) 21:08:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 21:08:11 executing program 5: write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) 21:08:11 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0xc0189436, &(0x7f0000000140)={'ip6tnl0\x00'}) 21:08:11 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 21:08:11 executing program 2: setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) [ 1625.587106][T23162] device bond81 entered promiscuous mode [ 1625.625481][T23162] 8021q: adding VLAN 0 to HW filter on device bond81 21:08:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="340000002580"], 0x34}, 0x300}, 0x0) [ 1625.664008][T23174] bond81: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1625.706573][T23174] bond81: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:11 executing program 3: r0 = socket(0xa, 0x6, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x3, @bcast}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) 21:08:11 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x480, 0x0, &(0x7f0000000040)=0x600) 21:08:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 21:08:12 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f000000080001001100000008000300b7000000080001000b00000008000100060000001300010062726f6164636173742d6c696e6b00004400e68008000300070000000800030200010000800800040001040000080001001c00000008000200f504000008000200faffffff08000400010001001300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003400078008000200fcffffff08000200ff0100000800020009000000080001"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:12 executing program 5: r0 = socket(0x1, 0x1, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x89e0, 0x0) 21:08:12 executing program 1: r0 = socket(0x11, 0x2, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x10000, 0x0, 0x0) 21:08:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0xf11, 0x12) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) 21:08:12 executing program 3: r0 = timerfd_create(0x0, 0x0) io_setup(0x6, &(0x7f00000000c0)=0x0) r2 = timerfd_create(0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000100)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 21:08:12 executing program 2: clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0x0], 0x1}, 0x58) sched_rr_get_interval(0x0, &(0x7f0000000300)) 21:08:12 executing program 5: clone3(&(0x7f0000000540)={0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {}, &(0x7f0000000140)=""/189, 0xbd, &(0x7f0000000800)=""/210, &(0x7f0000000500)=[0x0], 0x5}, 0xfffffffffffffeff) 21:08:12 executing program 1: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) 21:08:12 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x23, &(0x7f0000000000), 0x10) 21:08:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) [ 1626.459420][T23242] device bond82 entered promiscuous mode 21:08:12 executing program 5: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x5452, &(0x7f0000000180)=@buf) [ 1626.510849][T23242] 8021q: adding VLAN 0 to HW filter on device bond82 [ 1626.569693][T23256] bond82: (slave ip6tnl1): The slave device specified does not support setting the MAC address 21:08:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@getchain={0x24, 0x66, 0x1}, 0x24}}, 0x0) [ 1626.624051][T23256] bond82: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:13 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f000000080001001100000008000300b7000000080001000b00000008000100060000001300010062726f6164636173742d6c696e6b00004400e68008000300070000000800030200010000800800040001040000080001001c00000008000200f504000008000200faffffff08000400010001001300010062726f6164636173742d6c696e6b00001300010062726f6164636173742d6c696e6b00003400078008000200fcffff"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:13 executing program 2: socket(0x1e, 0x5, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) 21:08:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0xf, 0x0, &(0x7f0000000040)) 21:08:13 executing program 3: r0 = socket(0xa, 0x1, 0x106) accept4(r0, 0x0, 0x0, 0x0) 21:08:13 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8922, &(0x7f0000003900)={'batadv0\x00'}) 21:08:13 executing program 4: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[], 0xd8}}, 0x0) 21:08:13 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000280)={'syz_tun\x00', {0x2, 0x0, @local}}) 21:08:13 executing program 5: r0 = socket(0x2, 0x6, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, 0x0, 0x0) [ 1627.038289][T23311] batadv0: mtu less than device minimum 21:08:13 executing program 3: syz_mount_image$jffs2(&(0x7f0000000340)='jffs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000000480)) 21:08:13 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffc0}, 0x0) 21:08:13 executing program 1: select(0xffffffffffffff44, &(0x7f0000000180), 0x0, 0x0, 0x0) 21:08:13 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_dccp_int(r0, 0x84, 0x3, 0x0, 0x0) [ 1627.212316][T23313] device bond83 entered promiscuous mode [ 1627.255207][T23357] No source specified [ 1627.293667][T23313] 8021q: adding VLAN 0 to HW filter on device bond83 [ 1627.306155][T23317] bond83: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1627.319768][T23357] No source specified [ 1627.345418][T23317] bond83: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:13 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f000000080001001100000008000300b7000000080001000b00000008000100060000001300010062726f6164636173742d6c696e6b00004400e68008000300070000000800030200010000800800040001040000080001001c00000008000200f504000008000200faffffff08000400010001001300010062726f6164636173742d6c696e6b00001300010062726f61646361"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:13 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x890d, 0x0) 21:08:13 executing program 3: r0 = socket(0x10, 0x2, 0x0) bind$netrom(r0, 0x0, 0x0) 21:08:13 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x88, 0x64, &(0x7f0000000000)={0xffff0000}, 0x10) 21:08:13 executing program 4: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xffffffffffffffff, 0x21a402) 21:08:13 executing program 2: r0 = socket(0xa, 0x5, 0x0) recvmsg$can_j1939(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x22) 21:08:13 executing program 5: r0 = socket(0x2, 0x3, 0xff) recvmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x10160) 21:08:14 executing program 4: syz_mount_image$jffs2(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x8}, 0x18) 21:08:14 executing program 3: r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8940, 0x0) 21:08:14 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x40305829, 0x0) 21:08:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r1, 0x11, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x2c}}, 0x0) 21:08:14 executing program 4: syz_mount_image$exfat(0x0, &(0x7f0000000040)='./file0\x00', 0x20, 0x8, &(0x7f0000001580)=[{&(0x7f0000000080)="0cb3dae478bbe24af2b860907ab5684f8deaf0c8ec4ed54b82a6ea1f3a2edc72e4957832b9e5bd4ed8474dd2bc0174667ea1637448999671fc91d631bf526284a7081ce9bc67470169a25af728aff57d45ba7a1beb3bfc12d9cb6eafe229", 0x5e, 0xaf1f}, {&(0x7f0000000100)="2a0f1d26c873efa3fc104fbe080ca6fc427cf49350a48e281fdac9bb672fa13ae16026f4c1b1d560cf55d02ba90031d94043d7c2177b4a0e0c168e1e61a227bea9bd3ab4e4de49781b003e65f8b9f6ddc209e6836ad13f748d1761c02d041dd910370a2e5b91987848377dec6de8f17e5e4c8813bd84730bb3661d06053e7d316d466252702c7e490e9ee917f750e08923a020444f5dd829542ebb17f9d51a6b4af2ca82b396b980acff560939a992ced1c1ca412abe09b50600f895e05a33bae5833ffbb63b52df6a5c73e5", 0xcc, 0x9}, {&(0x7f0000000200)="681c2492ffb23bbcc7e6d2f6714705b9aa21910508150722ee42f47a9f22c91647f683042bde7b9daa5edff9aa9230cf7d23e3cd1279b56f982e1b1446415db1746202f177cfb3c220466e57e2e96238a3b4e185413da651cf8ca6a53407be9a4bdf", 0x62, 0x80000001}, {&(0x7f0000000280)="b85430d2ce8285813adbcecba7939ab48411ab4456b594617025f80a99e0b1f68080e47be1e284273dc4575cbd5759282e73342c8b7dc7701a0f624a0bb94429de1d36ce2b64b0b0ef661da3b16cc0dcb62c87df0e9db5788b2c5889d51340563ae87f86bc5532d895a79f7d5bc92187a3bc43cf30ac2d3c24325ba83e0a0f315a7b4ed913ac09db37041a29a6258909c5a4abc2772f6e7f5250ff8f1952b4b99612e3eab8f995ff68ac19c8943e5f92a247738a775c9f809eb8e2fa7fded18de63200b344cbb04510ee1ca668ec7fa9629f94b16bfd5996c7628aab6e54557df45b", 0xe2, 0x1}, {&(0x7f0000000380)="92da43fc5cb6b86be9b91b218a0638888d5e2762b8178e0f478ffee64a405ddc26c7e0348e8724bc84c2e0b5f8314f3b1dd9f40e00cf8c80ae21c86b1e2884056c3647c9a1ed58f2c3fdd90f328613505c9e20182586fb6210d45a214c2f9dd0ea643376b4ba75021e610e9142e0fabefc7dacc2130ee79b5fe9c193f37cfff0", 0x80, 0x2}, {&(0x7f0000000400)="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", 0x1000, 0x7}, {&(0x7f0000001400)="df1eb2758dd82eb1ab8b5844a21275555d070d631d4a6f3d520a6ea6a08ca5650da385ccf837e2f0216a08b149aad90208c25f40e02b80b17f61a4ac52c5360226afcb94163ca6e7e0b46b0519d1255a32e4fef6a76f52f45f0b9a1600edac0e3474e3f6ed4065b84a99cd0676bf7e7f92639d345abbabcd3e5797286d24e749d6628461902a93feb59254b2880251dc97cdaf0fed4a61d5bf83c5f13608962608d370d977ede8bf52bf3259a1dbfbe1d6d6a8e8620e57f89a6bff5e33bcc599f25d3537cc8fd0971752cca58a9189571afb69", 0xd3, 0x6}, {&(0x7f0000001500)="5120be3daea367a19bef4aa3733154e0c2dca9348a7d82434c86809753cadb943edc18bef8939f7fe7c76ab1e4742a523b32f3cb628182b5bf7195a929045322ebdcd65c856d297c75c97cf0494537905c8a6a3a6c22d3a4438b3f4872dc6d9a4896d058e4a4fbe908be4c1dc5c5bf55aa2d008a7c33f8119731", 0x7a, 0x5}], 0x2a10013, &(0x7f0000001640)={[{@gid={'gid', 0x3d, 0xee01}}, {@errors_continue='errors=continue'}, {@utf8='utf8'}, {@dmask={'dmask', 0x3d, 0x1}}, {@allow_utime={'allow_utime', 0x3d, 0x4}}, {@discard='discard'}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}, {@uid={'uid', 0x3d, 0xee01}}, {@namecase='namecase=1'}], [{@dont_appraise='dont_appraise'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfsroot={'smackfsroot'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@subj_type={'subj_type', 0x3d, '-'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@audit='audit'}, {@obj_role={'obj_role'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x34, 0x38, 0x34, 0x64, 0x61, 0x35, 0x33], 0x2d, [0x36, 0x39, 0x38, 0x37], 0x2d, [0x63, 0x36, 0x61, 0x35], 0x2d, [0x62, 0x66, 0x63, 0x36], 0x2d, [0x61, 0x30, 0x31, 0x32, 0x38, 0x63, 0x34, 0x65]}}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) [ 1628.061843][T23381] device bond84 entered promiscuous mode [ 1628.068462][T23381] 8021q: adding VLAN 0 to HW filter on device bond84 [ 1628.084809][T23384] bond84: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1628.164734][T23384] bond84: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:14 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f000000080001001100000008000300b7000000080001000b00000008000100060000001300010062726f6164636173742d6c696e6b00004400e68008000300070000000800030200010000800800040001040000080001001c00000008000200f504000008000200faffffff08000400010001001300010062726f61646361"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:14 executing program 5: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x4, 0x0, &(0x7f0000000240)) 21:08:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x40000094, 0x0, 0x35a}]}) 21:08:14 executing program 3: r0 = socket(0x11, 0x803, 0x0) getpeername$netrom(r0, 0x0, 0x0) 21:08:14 executing program 4: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x5411, 0x0) 21:08:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r1, 0x11, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x2c}}, 0x0) 21:08:14 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x80041284, r0) 21:08:14 executing program 2: r0 = socket(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, 0x0) [ 1628.580749][T23444] device bond85 entered promiscuous mode [ 1628.588094][T23444] 8021q: adding VLAN 0 to HW filter on device bond85 [ 1628.604108][T23459] bond85: (slave ip6tnl1): The slave device specified does not support setting the MAC address 21:08:14 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9) sendto$inet(r0, 0x0, 0x0, 0x400d80c, &(0x7f0000000300)={0x2, 0x0, @loopback}, 0x10) 21:08:14 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) connect$rds(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) [ 1628.627591][T23459] bond85: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:14 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, 0x0) 21:08:15 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8930, &(0x7f0000000040)={'veth0_to_team\x00', @ifru_data=0x0}) 21:08:15 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f000000080001001100000008000300b7000000080001000b00000008000100060000001300010062726f6164636173742d6c696e6b00004400e68008000300070000000800030200010000800800040001040000080001001c00000008000200f504000008000200faffff"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:15 executing program 4: r0 = gettid() kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, 0xffffffffffffffff, 0x0) 21:08:15 executing program 5: r0 = socket(0x11, 0x803, 0x0) recvmsg$can_j1939(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x0) 21:08:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, r1, 0x11, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x2c}}, 0x0) 21:08:15 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x1410, 0x1}, 0x10}}, 0x0) select(0x40, &(0x7f0000000040), &(0x7f0000000180)={0x9}, 0x0, 0x0) 21:08:15 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 21:08:15 executing program 4: r0 = socket(0x29, 0x2, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x60}}, 0x4840) 21:08:15 executing program 5: r0 = socket(0xa, 0x1, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}}}, 0x2c}}, 0x40440d5) 21:08:15 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x10000000) 21:08:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xae60, 0x0) 21:08:15 executing program 1: r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8901, &(0x7f0000000180)=@buf) 21:08:15 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x2, 0x0, 0x0) [ 1629.415914][T23513] device bond86 entered promiscuous mode [ 1629.435627][T23513] 8021q: adding VLAN 0 to HW filter on device bond86 [ 1629.472841][T23527] bond86: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1629.534586][T23527] bond86: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:15 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f000000080001001100000008000300b7000000080001000b00000008000100060000001300010062726f6164636173742d6c696e6b00004400e68008000300070000000800030200010000800800040001040000080001"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:15 executing program 1: socket(0x23, 0x0, 0x9) 21:08:15 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000080)={0xffffffff}, 0x10) 21:08:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x176}]}) 21:08:15 executing program 3: r0 = socket(0xa, 0x2, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, 0x0, 0x0) 21:08:15 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) pidfd_send_signal(r0, 0x0, &(0x7f00000001c0)={0x16, 0x0, 0x40}, 0x0) 21:08:16 executing program 5: sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, 0x0, 0x0) 21:08:16 executing program 3: r0 = socket(0x1, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000000100)) 21:08:16 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xb703, 0x0) 21:08:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x4d0}]}) 21:08:16 executing program 1: r0 = socket(0x1, 0x1, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, 0x0, 0x0) 21:08:16 executing program 1: open$dir(&(0x7f0000000040)='./file0\x00', 0xe8d5686310162272, 0x0) [ 1630.135868][T23584] device bond87 entered promiscuous mode [ 1630.160148][T23584] 8021q: adding VLAN 0 to HW filter on device bond87 [ 1630.181571][T23592] bond87: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1630.214390][T23592] bond87: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:16 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f000000080001001100000008000300b7000000080001000b00000008000100060000001300010062726f6164636173742d6c696e6b00004400e6800800030007000000"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:16 executing program 2: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x76, 0x0, &(0x7f0000000240)) 21:08:16 executing program 3: r0 = socket(0xa, 0x802, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, 0x0, 0x0) 21:08:16 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_dccp_int(r0, 0x84, 0x76, 0x0, 0x0) 21:08:16 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0xf, 0x0, 0x0) 21:08:16 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x5, 0x0, 0x8800) 21:08:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000001b000000000000000079"]) 21:08:16 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$qrtr(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000680)=""/240, 0xf0}], 0x1, &(0x7f0000000780)=ANY=[], 0x3d0}, 0x38, 0x0) write$nbd(r1, &(0x7f0000000340), 0x10) 21:08:16 executing program 4: r0 = socket(0x22, 0x2, 0x1) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0x0) 21:08:16 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) statx(r0, &(0x7f00000001c0)='\x00', 0x1000, 0x0, &(0x7f0000000200)) 21:08:16 executing program 3: bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 21:08:17 executing program 1: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000240)=0x10) recvmsg$kcm(r0, &(0x7f0000004b00)={0x0, 0x0, 0x0}, 0x0) [ 1630.879325][T23650] device bond88 entered promiscuous mode [ 1630.940591][T23650] 8021q: adding VLAN 0 to HW filter on device bond88 [ 1630.976414][T23670] bond88: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1631.032455][T23670] bond88: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:17 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f000000080001001100000008000300b7000000080001000b00000008000100060000001300010062726f6164636173"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000001b000000000000000079dae563"]) 21:08:17 executing program 3: perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:08:17 executing program 4: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8982, &(0x7f0000000180)=@buf) 21:08:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454ca, 0x400000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth0_macvtap\x00'}) 21:08:17 executing program 3: socket$inet6(0xa, 0x8000f, 0x0) 21:08:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x345}]}) 21:08:17 executing program 4: r0 = shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000000000/0x1000)=nil, 0xd000) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 21:08:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000200)=0x80) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, 0x0) 21:08:17 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100)=0x396940, 0x8) 21:08:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) [ 1631.555820][T23731] device bond89 entered promiscuous mode [ 1631.561810][T23731] 8021q: adding VLAN 0 to HW filter on device bond89 [ 1631.649125][T23739] bond89: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1631.704425][T23739] bond89: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:18 executing program 1: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f0000000240)=0x10) recvmsg$kcm(r0, &(0x7f0000004b00)={0x0, 0x0, 0x0}, 0x0) 21:08:18 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f000000080001001100000008000300b7000000080001000b000000"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="440200001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000f400128009000100766c616e00000000e4000280640004800c00010001f0ffff030000000c00010001010000080000000c0001009b0a0000020000000c00010002000000ff0100000c000100e1000000040000000c00010000ffffff060000000c00010006000000080000000c000100ff0f000002000000280004800c00010081000000010400000c00010009640000fbffffff0c00010006000000010400000c000200000000001500000006000100030000000600050088a8000006000500000000001c0004800c00010002000000070000000c00010000000200018000000c00020004000000100000000600050081"], 0x244}}, 0x0) 21:08:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae67, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) 21:08:18 executing program 2: r0 = socket(0x10, 0x80002, 0x4) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000400)=@bridge_setlink={0x5c, 0x12, 0x511, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14}]}]}, {0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc}]}]}]}, 0x5c}}, 0x0) 21:08:18 executing program 5: getsockname(0xffffffffffffffff, 0x0, 0x0) 21:08:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3d0329bd7000fbdbdf253e"], 0x38}}, 0x0) 21:08:18 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc0205647, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "466209cf"}}) [ 1632.167433][T23809] netlink: 304 bytes leftover after parsing attributes in process `syz-executor.4'. 21:08:18 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 21:08:18 executing program 4: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0xd, 0x0, 0x0) [ 1632.292348][T23813] device bond90 entered promiscuous mode [ 1632.300134][T23813] 8021q: adding VLAN 0 to HW filter on device bond90 21:08:18 executing program 3: r0 = socket(0x10, 0x80002, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, 0x0) 21:08:18 executing program 4: r0 = socket(0xa, 0x6, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) [ 1632.389560][T23848] bond90: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1632.495420][T23848] bond90: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:18 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 21:08:19 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c00000800040007000000080001000f00000008000100"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @ipv4={[], [], @broadcast}}}) 21:08:19 executing program 5: r0 = socket(0x2c, 0x3, 0x0) accept$netrom(r0, 0x0, 0x0) 21:08:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:08:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xae45, 0x0) 21:08:19 executing program 1: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x7, 0x0, 0x0) 21:08:19 executing program 4: r0 = io_uring_setup(0x1a3c, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x300000c, 0x811, r0, 0x0) syz_open_dev$char_raw(&(0x7f0000000100)='/dev/raw/raw#\x00', 0x1, 0x0) syz_open_dev$char_raw(&(0x7f0000000100)='/dev/raw/raw#\x00', 0x1, 0x189041) 21:08:19 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x100) 21:08:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454ca, 0x400000) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x36a669ddd7fe931) 21:08:19 executing program 3: r0 = socket(0x18, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 21:08:19 executing program 1: r0 = socket(0x11, 0x803, 0x0) ioctl$sock_ifreq(r0, 0x8919, &(0x7f0000000040)={'syzkaller1\x00', @ifru_data=0x0}) 21:08:19 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x401, 0x0) statx(r0, &(0x7f00000001c0)='\x00', 0x1000, 0x0, &(0x7f0000000200)) [ 1633.255982][T23882] device bond91 entered promiscuous mode [ 1633.291728][T23882] 8021q: adding VLAN 0 to HW filter on device bond91 [ 1633.326699][T23901] bond91: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1633.366020][T23901] bond91: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:19 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480440007800800020000000000080003009e1c0000"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:19 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454ca, 0x401006) select(0x40, &(0x7f0000002280), &(0x7f00000022c0)={0x40}, 0x0, 0x0) 21:08:19 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 21:08:19 executing program 2: r0 = socket(0x29, 0x5, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 21:08:19 executing program 5: r0 = socket(0x1e, 0x5, 0x0) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x40) 21:08:19 executing program 1: syz_mount_image$jffs2(&(0x7f00000000c0)='jffs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[]) [ 1633.800382][T23962] No source specified 21:08:20 executing program 5: r0 = socket(0x28, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x28, 0x9, 0x0, 0x0) [ 1633.836209][T23962] No source specified 21:08:20 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00'}) 21:08:20 executing program 4: r0 = socket(0x1d, 0x2, 0x2) connect$can_j1939(r0, 0x0, 0x0) 21:08:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000740)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 21:08:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, 0x0) [ 1633.989280][T23969] device bond92 entered promiscuous mode [ 1633.997054][T23969] 8021q: adding VLAN 0 to HW filter on device bond92 21:08:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4004ae99, &(0x7f0000000000)) [ 1634.048761][T23991] bond92: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1634.137753][T23991] bond92: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:20 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdbdf250d00000074010480"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:20 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x541b, 0x532000) 21:08:20 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x891e, &(0x7f0000000000)={'ip_vti0\x00'}) 21:08:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x2a, 0x2, 0x0) getsockname(r1, &(0x7f0000016d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000016dc0)=0x80) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=@getqdisc={0x24, 0x26, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x1}}}, 0x24}}, 0x0) 21:08:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454ca, 0x400000) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000200)) 21:08:20 executing program 3: io_setup(0x400, &(0x7f0000000080)=0x0) r1 = socket$rds(0x15, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x8000000000000000}]) 21:08:20 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8924, &(0x7f0000000000)={'vlan1\x00'}) 21:08:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x5c, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @empty}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={[], [], @broadcast}}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x5c}}, 0x0) 21:08:20 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, &(0x7f00000001c0)) 21:08:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) [ 1634.618747][T24046] device bond93 entered promiscuous mode [ 1634.625149][T24046] 8021q: adding VLAN 0 to HW filter on device bond93 21:08:20 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) 21:08:20 executing program 3: socket(0x36, 0x0, 0x0) [ 1634.706377][T24085] bond93: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1634.749126][T24085] bond93: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:21 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdb"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:21 executing program 2: sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000880)=ANY=[@ANYBLOB="0c00bd00090003000100ff070c004300ff010000010000800c009900ffffffffffffffff0c00430005000000000000000500e400010000000600ab001f0000000600ed0043050000e900be00f634aaa5c981aa5ced7f2c8e15417e6f9ab8abd91d6c0127af412f9ecfab4c8ba47d9e5196ea234f09b1db2027ce16526405ba2df3"], 0x158}}, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x401) write$rfkill(r0, &(0x7f0000000080), 0xfdef) 21:08:21 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x8, 0x0, 0x0) 21:08:21 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8953, &(0x7f0000003900)={'batadv0\x00'}) 21:08:21 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 21:08:21 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x88, 0xa, &(0x7f0000000000), 0x10) 21:08:21 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') ioctl$SIOCSIFMTU(r0, 0x8931, &(0x7f0000000140)={'team_slave_1\x00'}) 21:08:21 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000000), 0x3) 21:08:21 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 21:08:21 executing program 3: r0 = shmget$private(0x0, 0x800000, 0x0, &(0x7f0000800000/0x800000)=nil) shmat(r0, &(0x7f0000000000/0x14000)=nil, 0x7000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 21:08:21 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) statx(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 21:08:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4188aea7, &(0x7f0000000000)={0x1, 0x0, [{0x0, 0x0, 0x3}]}) [ 1635.450631][T24119] device bond94 entered promiscuous mode [ 1635.495922][T24119] 8021q: adding VLAN 0 to HW filter on device bond94 [ 1635.570373][T24138] bond94: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1635.663634][T24138] bond94: (slave ip6tnl1): Error -95 calling set_mac_address [ 1635.857207][T24161] device lo entered promiscuous mode 21:08:22 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB="20002bbd7000fbdb"], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) 21:08:22 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) read$char_raw(r0, &(0x7f0000000200)={""/3059}, 0x6300) 21:08:22 executing program 5: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x25, 0x0, 0x0) 21:08:22 executing program 1: r0 = socket(0x1e, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xf0ff7f}}, 0x0) 21:08:22 executing program 4: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 21:08:22 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x5452, &(0x7f0000000340)=0x5) 21:08:22 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000140)={'team_slave_1\x00'}) 21:08:22 executing program 3: socket$inet(0x2, 0x3, 0xff) 21:08:22 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) [ 1636.622303][T24200] device bond95 entered promiscuous mode 21:08:22 executing program 4: r0 = socket(0x29, 0x5, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1636.703708][T24200] 8021q: adding VLAN 0 to HW filter on device bond95 [ 1636.716521][T24211] bond95: (slave ip6tnl1): The slave device specified does not support setting the MAC address 21:08:23 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)={0x18, 0x14, 0x759, 0x0, 0x0, {0x1e}, [@INET_DIAG_REQ_BYTECODE={0x4}]}, 0x18}}, 0x0) [ 1636.777266][T24211] bond95: (slave ip6tnl1): Error -95 calling set_mac_address [ 1637.162737][T24247] team_slave_1: mtu less than device minimum 21:08:23 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB=' \x00+'], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:23 executing program 3: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) 21:08:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0xc0010140}]}) 21:08:23 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0xc0189436, &(0x7f0000000340)) 21:08:23 executing program 5: r0 = socket(0xa, 0x1, 0x106) recvmmsg(r0, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/36, 0x24}], 0x1}}], 0x2, 0x0, 0x0) 21:08:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x14}}, 0x0) 21:08:23 executing program 3: syz_mount_image$sysv(&(0x7f0000000300)='sysv\x00', &(0x7f0000000bc0)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)) 21:08:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x8, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, 0x0) 21:08:23 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000580), 0x3fffff) 21:08:23 executing program 4: r0 = socket(0x26, 0x5, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0x0) 21:08:23 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x29, 0x0, 0x0) 21:08:23 executing program 5: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x80108906, 0x0) [ 1637.624087][T24272] device bond96 entered promiscuous mode [ 1637.663704][T24272] 8021q: adding VLAN 0 to HW filter on device bond96 [ 1637.677588][T24280] bond96: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1637.720613][T24280] bond96: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:24 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB=' '], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:24 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x40305828, 0x0) 21:08:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x401070cd, 0xffffffffffffffff) 21:08:24 executing program 3: semget$private(0x0, 0x0, 0x0) 21:08:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0xc0000080}]}) 21:08:24 executing program 2: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) 21:08:24 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80101, 0x0) read$FUSE(r0, 0x0, 0x0) 21:08:24 executing program 2: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000001580)=[{0x0}], 0x0, 0x0) 21:08:24 executing program 3: socket(0x1, 0x3, 0x0) select(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0) 21:08:24 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) 21:08:24 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000002580)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc0505611, &(0x7f00000025c0)={0x0, 0x0, 0x0, {0x0, @pix_mp}}) 21:08:24 executing program 5: bpf$MAP_CREATE(0xa, &(0x7f00004f9fe4), 0x40) [ 1638.450026][T24348] device bond97 entered promiscuous mode [ 1638.463943][T24348] 8021q: adding VLAN 0 to HW filter on device bond97 [ 1638.496798][T24363] bond97: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1638.586754][T24363] bond97: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:25 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYRES16=r6, @ANYBLOB], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:25 executing program 4: r0 = socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 21:08:25 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000002580)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc050565d, &(0x7f00000025c0)={0x0, 0x0, 0x0, {0x0, @pix_mp}}) 21:08:25 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5411, &(0x7f0000003900)={'batadv0\x00'}) 21:08:25 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) accept4$phonet_pipe(r0, 0x0, 0x0, 0x0) 21:08:25 executing program 1: r0 = socket(0x2c, 0x3, 0x0) connect$tipc(r0, 0x0, 0x0) 21:08:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlockall() keyctl$session_to_parent(0x8) 21:08:25 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 21:08:25 executing program 1: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 21:08:25 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x11, 0x0, 0x0, 0x0) 21:08:25 executing program 3: r0 = socket(0xa, 0x5, 0x0) sendto$netrom(r0, &(0x7f0000000580)="9c", 0x1, 0x44015, 0x0, 0x0) [ 1639.098993][T24422] device bond98 entered promiscuous mode [ 1639.131528][T24422] 8021q: adding VLAN 0 to HW filter on device bond98 21:08:25 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl$SIOCPNDELRESOURCE(r0, 0x4020940d, 0x0) [ 1639.148591][T24446] bond98: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1639.250769][T24446] bond98: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') 21:08:25 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x89e2, 0x0) 21:08:25 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2800007, 0x11, r0, 0x0) 21:08:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x140}]}) 21:08:25 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYBLOB], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00') sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x20, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) 21:08:25 executing program 5: r0 = socket(0x2c, 0x3, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x7, 0x0, 0x0) 21:08:25 executing program 3: openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x549c0, 0x0) 21:08:25 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x4042) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 21:08:25 executing program 1: openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000100)={0x395040}, 0x18) 21:08:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) [ 1639.805984][T24494] device bond99 entered promiscuous mode [ 1639.848331][T24494] 8021q: adding VLAN 0 to HW filter on device bond99 21:08:26 executing program 3: r0 = socket(0x2, 0x3, 0x1) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) [ 1639.919837][T24511] bond99: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1639.939277][ T26] audit: type=1800 audit(1601500106.101:71): pid=24538 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="loop0" dev="sda1" ino=16345 res=0 errno=0 21:08:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @empty}, {0x2, 0x0, @broadcast}}) 21:08:26 executing program 4: r0 = socket$inet(0x2, 0x3, 0x8) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000040)={'wg0\x00', @ifru_flags}) 21:08:26 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x14, 0x14, 0x759, 0x0, 0x0, {0x29}}, 0x14}}, 0x0) [ 1639.997075][T24511] bond99: (slave ip6tnl1): Error -95 calling set_mac_address [ 1640.007323][ T26] audit: type=1800 audit(1601500106.141:72): pid=24538 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="loop0" dev="sda1" ino=16345 res=0 errno=0 21:08:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00') sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x18, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 21:08:26 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB="dc040000", @ANYBLOB], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:26 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x0, 0x0, "5f920fb4721d5f1b96b4f9a42fbf20543c18e9184f7769c70a4387ba6d88fbdef59283062c8145bcd14c35bc7ee0b835a2e4bbd24dd7218259a187b821a9e4d6", "a87fda578003b61e312abac9aceeb642c756936826d6b7b487ab6dbde6bbfe18dfef0e9fb3c0ee3e56527db2cbd63b720147612e2e2639fda0ae9541fb4a1724", "2b2c261d6dd7422d918abd2cbf7a82382a7398116f3dae06593f110ff34e3174"}) 21:08:26 executing program 4: r0 = socket(0x1, 0x3, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={0x0, 0x10}}, 0x0) 21:08:26 executing program 3: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x18, 0x0, 0x0) 21:08:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x16, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:08:26 executing program 1: r0 = socket(0x1e, 0x5, 0x0) connect$unix(r0, 0x0, 0x0) 21:08:26 executing program 2: r0 = socket(0x11, 0xa, 0x0) bind$netrom(r0, 0x0, 0x0) 21:08:26 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x1276, 0xffffffffffffffff) 21:08:26 executing program 1: r0 = socket(0xa, 0x3, 0xfd) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x240088d5) 21:08:26 executing program 5: r0 = socket(0xa, 0x6, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000040)) 21:08:26 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0xc, 0x0, 0x0) 21:08:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x17a}]}) [ 1640.979866][T24577] device bond100 entered promiscuous mode [ 1641.015223][T24577] 8021q: adding VLAN 0 to HW filter on device bond100 [ 1641.040369][T24589] bond100: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1641.057819][T24589] bond100: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:27 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}, 0x1, 0x0, 0x0, 0x801}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xae78, 0x0) 21:08:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) bind$packet(r0, 0x0, 0x0) 21:08:27 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000002580)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000025c0)={0x0, 0x0, 0x0, {0xe, @pix_mp}}) 21:08:27 executing program 4: r0 = fanotify_init(0x1, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x5450, 0x0) 21:08:27 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2b, 0x0, 0x0) 21:08:27 executing program 2: r0 = socket(0x23, 0x5, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 21:08:27 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x80083313) 21:08:27 executing program 5: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8932, &(0x7f0000000140)={'team_slave_1\x00'}) 21:08:27 executing program 3: r0 = semget$private(0x0, 0x8, 0x0) semtimedop(r0, &(0x7f0000001080)=[{0x0, 0x9229}], 0x1, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000200)) [ 1641.666311][T24652] device bond101 entered promiscuous mode [ 1641.680385][T24652] 8021q: adding VLAN 0 to HW filter on device bond101 21:08:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1}, 0x1c}}, 0x0) [ 1641.733937][T24677] bond101: (slave ip6tnl1): The slave device specified does not support setting the MAC address 21:08:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x5, 0x4, 0x24, 0x4}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x5, 0x4, 0x24, 0x4}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x7, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0x92, &(0x7f0000000040)=""/146, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1641.815111][T24677] bond101: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:28 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x4004801) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:28 executing program 4: socket(0x21, 0x0, 0x0) 21:08:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x10, 0x0, &(0x7f00000001c0)) 21:08:28 executing program 5: r0 = socket(0x1e, 0x5, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xf) 21:08:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x11}]}) 21:08:28 executing program 5: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0xc, 0x0, 0x0) 21:08:28 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2a, 0x0, 0x0) 21:08:28 executing program 2: r0 = socket(0x10, 0x80002, 0x0) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) [ 1642.513270][T24723] device bond102 entered promiscuous mode [ 1642.519542][T24723] 8021q: adding VLAN 0 to HW filter on device bond102 21:08:28 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_TIMEBASE(r0, 0xc0045401, 0x0) [ 1642.559474][T24756] bond102: (slave ip6tnl1): The slave device specified does not support setting the MAC address 21:08:28 executing program 3: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r0, @ANYBLOB="0100000000000000200005"], 0x40}}, 0x0) 21:08:28 executing program 1: readlinkat(0xffffffffffffff9c, 0x0, &(0x7f0000000080)=""/216, 0xd8) 21:08:28 executing program 2: socket(0x23, 0x5, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x2) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x61}, &(0x7f0000000100)={0x0, 0x989680}, 0x0) [ 1642.638519][T24756] bond102: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:29 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(r4, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:29 executing program 4: r0 = socket(0x2, 0x3, 0x1) sendto$netrom(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 21:08:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @empty}}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @empty}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x2000035c}}, 0x0) 21:08:29 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_dccp_int(r0, 0x84, 0x83, 0x0, 0x0) 21:08:29 executing program 2: r0 = socket(0x1e, 0x5, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}}, 0x0) 21:08:29 executing program 3: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8918, 0x0) 21:08:29 executing program 2: r0 = socket(0x1, 0x1, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f0000000300)={0x0}}, 0x0) 21:08:29 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x32, 0x0, 0x0) 21:08:29 executing program 5: r0 = io_uring_setup(0x1a3c, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x300000c, 0x811, r0, 0x0) syz_open_dev$char_raw(&(0x7f0000000100)='/dev/raw/raw#\x00', 0x1, 0x14d442) syz_open_dev$char_raw(&(0x7f0000000100)='/dev/raw/raw#\x00', 0x1, 0x189041) 21:08:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x1274, 0xffffffffffffffff) 21:08:29 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x88, 0xa, 0x0, &(0x7f00000000c0)) [ 1643.384234][T24797] device bond103 entered promiscuous mode 21:08:29 executing program 2: bpf$MAP_CREATE(0x15, 0x0, 0x0) [ 1643.439613][ T26] audit: type=1800 audit(1601500109.601:73): pid=24843 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name=FF1F dev="sda1" ino=16292 res=0 errno=0 [ 1643.486515][T24797] 8021q: adding VLAN 0 to HW filter on device bond103 [ 1643.539844][T24802] bond103: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1643.585317][ T26] audit: type=1800 audit(1601500109.701:74): pid=24849 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name=FF1F dev="sda1" ino=16292 res=0 errno=0 [ 1643.617873][T24802] bond103: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:30 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, &(0x7f0000000040)={0xffffffffffffffff, 0x100000000004}) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:30 executing program 3: r0 = socket(0x26, 0x5, 0x0) bind$can_j1939(r0, 0x0, 0x0) 21:08:30 executing program 1: setreuid(0xee00, 0xee01) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={0x0, 0x28}}, 0x0) 21:08:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) 21:08:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_dccp_int(r0, 0x10e, 0xa, 0x0, 0x0) 21:08:30 executing program 2: socket(0x10, 0x3, 0x2c) 21:08:30 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x15, &(0x7f0000000000), 0x10) 21:08:30 executing program 1: r0 = socket(0x28, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x9, 0x0, 0x0) 21:08:30 executing program 2: statx(0xffffffffffffffff, &(0x7f00000001c0)='\x00', 0x1000, 0x0, 0x0) 21:08:30 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x7, 0x0, &(0x7f0000000180)) 21:08:30 executing program 2: r0 = socket(0x25, 0x5, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) [ 1644.160392][T24875] device bond104 entered promiscuous mode [ 1644.175573][T24875] 8021q: adding VLAN 0 to HW filter on device bond104 21:08:30 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000910000/0x3000)=nil) shmat(r0, &(0x7f0000dbf000/0x2000)=nil, 0x5800) shmat(0x0, &(0x7f0000802000/0x4000)=nil, 0x6800) [ 1644.213381][T24913] bond104: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1644.271174][T24913] bond104: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:30 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r6, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r7, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r7}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:30 executing program 1: r0 = socket(0x2, 0x3, 0x3b) bind$packet(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x73) 21:08:30 executing program 5: syz_mount_image$minix(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 21:08:30 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) ioctl$SNAPSHOT_ATOMIC_RESTORE(r0, 0x3304) 21:08:30 executing program 2: r0 = socket(0x1e, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x89a1, &(0x7f0000000080)={'macvlan1\x00', @ifru_hwaddr=@random}) 21:08:30 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0x8912, 0x0) 21:08:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000040)={&(0x7f0000000000)={0xa, 0x7}, 0x31, &(0x7f0000000180)={0x0, 0x2}}, 0xbb8) 21:08:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netrom(r0, 0x0, 0x0) 21:08:30 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x40305839, 0x0) 21:08:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x240}]}) 21:08:31 executing program 1: r0 = socket(0x2, 0x3, 0x4) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, 0x0, 0x0) [ 1644.915810][T24944] device bond105 entered promiscuous mode [ 1644.930172][T24944] 8021q: adding VLAN 0 to HW filter on device bond105 21:08:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x580}]}) [ 1644.974404][T24970] bond105: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1645.067639][T24970] bond105: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:31 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:31 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8940, &(0x7f0000003900)={'batadv0\x00'}) 21:08:31 executing program 2: mmap$qrtrtun(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x3f) 21:08:31 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_dccp_int(r0, 0x84, 0x0, 0x0, 0x2) 21:08:31 executing program 5: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x89f2, 0x0) 21:08:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000180)={0x1, 0x0, [{0x17b}]}) 21:08:31 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r0, &(0x7f0000000580)={&(0x7f0000000140)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@fadd={0x58, 0x114, 0x6, {{}, 0x0, 0x0}}], 0x58}, 0x0) 21:08:31 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000005c0)='/dev/vcsa#\x00', 0x1f, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, 0x0) 21:08:31 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_dccp_int(r0, 0x84, 0x18, 0x0, 0x0) 21:08:31 executing program 5: memfd_create(0x0, 0xe0) 21:08:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}, r1}}, 0x48) 21:08:31 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000004240)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) [ 1645.826988][T25027] device bond106 entered promiscuous mode [ 1645.883303][T25027] 8021q: adding VLAN 0 to HW filter on device bond106 [ 1645.896739][T25042] bond106: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1645.953753][T25042] bond106: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:32 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:32 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x200300, 0x0) fcntl$setflags(r0, 0x2, 0x0) 21:08:32 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a741bce1729d2b4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:08:32 executing program 4: openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 21:08:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0xc0000103}]}) 21:08:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x1d9}]}) 21:08:32 executing program 1: syz_open_dev$mouse(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) 21:08:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x140}]}) 21:08:32 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000000c0)=ANY=[@ANYBLOB="480000001400c989ac2c2af7dd655d1ce4"], 0x48}}, 0x0) 21:08:32 executing program 2: fsopen(&(0x7f0000000000)='bdev\x00', 0x0) 21:08:32 executing program 3: r0 = socket(0x1e, 0x5, 0x0) recvmmsg(r0, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000080)=""/231, 0xe7}], 0x1}}], 0x1, 0x0, 0x0) 21:08:32 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000480)={0x43, 0x0, 0x3}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000480)={0x43}, 0x10) [ 1646.548626][T25104] device bond107 entered promiscuous mode [ 1646.571447][T25104] 8021q: adding VLAN 0 to HW filter on device bond107 [ 1646.636571][T25128] bond107: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1646.731536][T25128] bond107: (slave ip6tnl1): Error -95 calling set_mac_address 21:08:33 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:33 executing program 5: read$qrtrtun(0xffffffffffffffff, 0x0, 0x0) 21:08:33 executing program 1: add_key$user(&(0x7f000000cc40)='user\x00', 0x0, 0x0, 0x10000000, 0xfffffffffffffff8) 21:08:33 executing program 4: r0 = socket(0x10, 0x2, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x10e, 0x3, 0x0, 0x0) 21:08:33 executing program 2: add_key$user(&(0x7f000000cc40)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 21:08:33 executing program 3: 21:08:33 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='wg2\x00', 0x10) 21:08:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0xc1}]}) 21:08:33 executing program 4: socket(0x11, 0x803, 0x0) 21:08:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 21:08:33 executing program 1: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x0) write$qrtrtun(r0, 0x0, 0x0) 21:08:33 executing program 5: bind$xdp(0xffffffffffffffff, 0x0, 0x0) [ 1647.496451][T25178] device bond108 entered promiscuous mode [ 1647.514210][T25178] 8021q: adding VLAN 0 to HW filter on device bond108 21:08:33 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:33 executing program 1: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 21:08:33 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xb701, 0x0) 21:08:33 executing program 2: r0 = socket(0xa, 0x5, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0x2}, 0x6e) 21:08:33 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x11, 0x67, &(0x7f00000002c0)={0xffff0000, {{0x2, 0x0, @multicast2}}}, 0x90) 21:08:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fdatasync(r0) 21:08:33 executing program 1: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8903, 0x0) 21:08:34 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0) 21:08:34 executing program 4: r0 = socket(0x1e, 0x5, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) [ 1647.815389][T25237] bond109 (uninitialized): Released all slaves 21:08:34 executing program 3: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x29, 0x0, 0x0) 21:08:34 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000002580)='/dev/video#\x00', 0x4, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000025c0)={0x0, 0x0, 0x0, {0x8, @pix_mp}}) 21:08:34 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:34 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) read$char_raw(r0, &(0x7f0000004200)={""/33948}, 0x8600) 21:08:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000140)) 21:08:34 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x125f, 0xffffffffffffffff) 21:08:34 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) select(0x40, &(0x7f0000002280), &(0x7f00000022c0)={0x40}, 0x0, 0x0) 21:08:34 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x6, 0x0, &(0x7f00000000c0)) [ 1648.135522][T25256] bond109 (uninitialized): Released all slaves 21:08:34 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8912, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') 21:08:34 executing program 2: r0 = socket(0x2, 0x3, 0x1) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0x0) 21:08:34 executing program 1: r0 = socket(0x2, 0x3, 0x100) recvmsg$can_j1939(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x2000) 21:08:34 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5421, &(0x7f0000000040)) 21:08:34 executing program 3: r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8981, 0x0) [ 1648.490132][T25274] bond109 (uninitialized): Released all slaves 21:08:34 executing program 2: ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0xffffffffffffffff) 21:08:34 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:34 executing program 1: r0 = socket(0xa, 0x3, 0x5) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, 0x0, 0x0) 21:08:34 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x140e, 0x205}, 0x10}}, 0x0) 21:08:34 executing program 5: socket(0xa, 0x1, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x9}, 0x0, 0x0) 21:08:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0xc0000100}]}) 21:08:34 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xffffffffffffff6e) [ 1648.751148][T25289] bond109 (uninitialized): Released all slaves 21:08:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x8004ae98, 0x0) 21:08:35 executing program 4: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x24, 0x0, &(0x7f00000001c0)) 21:08:35 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x25, 0x0, 0x0) 21:08:35 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {{}, {0x0, 0x4}, {0x14}}}, 0x30}}, 0x0) 21:08:35 executing program 3: r0 = socket(0x1e, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000080)={'macvlan1\x00', @ifru_hwaddr=@random}) 21:08:35 executing program 4: syz_emit_ethernet(0x22, &(0x7f0000000000)={@multicast, @remote, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @dev}}}}, 0x0) 21:08:35 executing program 1: socket$packet(0x11, 0x0, 0x300) [ 1649.144695][T25317] bond109 (uninitialized): Released all slaves 21:08:35 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:35 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_dccp_int(r0, 0x84, 0x0, 0x0, 0x0) 21:08:35 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8931, &(0x7f0000000140)={'team_slave_1\x00'}) 21:08:35 executing program 3: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000000c0)={'ip6gre0\x00'}) 21:08:35 executing program 4: socket(0x28, 0x1, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x9}, 0x0, 0x0) 21:08:35 executing program 1: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1d, 0x0, &(0x7f0000000240)) 21:08:35 executing program 5: r0 = socket(0x1e, 0x5, 0x0) bind$unix(r0, 0x0, 0x0) 21:08:35 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_dccp_int(r0, 0x84, 0x24, 0x0, 0x0) [ 1649.465465][T25337] bond109 (uninitialized): Released all slaves 21:08:35 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:35 executing program 3: syz_mount_image$exfat(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 21:08:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x14, r1, 0x917, 0x0, 0x0, {0x9}}, 0x14}}, 0x0) 21:08:35 executing program 4: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') shmat(0x0, &(0x7f0000000000/0x2000)=nil, 0x4000) 21:08:35 executing program 2: r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$sock(r0, &(0x7f0000000280)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x39}, 0x80, 0x0}, 0x0) 21:08:35 executing program 5: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {{}, {0x0, 0x2001}, {0x14}}}, 0x30}}, 0x0) [ 1649.733631][T25354] bond109 (uninitialized): Released all slaves 21:08:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0xda0}]}) 21:08:36 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:36 executing program 1: r0 = socket(0x2, 0x3, 0x3b) bind$packet(r0, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 21:08:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0xe1}]}) 21:08:36 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000000c0)={0xffff, 0x0, "0c8466"}) 21:08:36 executing program 5: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 21:08:36 executing program 1: r0 = socket(0x2, 0x3, 0x100) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x240088d5) [ 1650.088323][T25379] bond109 (uninitialized): Released all slaves 21:08:36 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x5, 0x0, 0x3) 21:08:36 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0) 21:08:36 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:36 executing program 5: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x21, 0x0, 0x0) 21:08:36 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x20000001) 21:08:36 executing program 1: r0 = socket(0x2, 0x1, 0x0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f0000000240)={&(0x7f0000000200), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x10, 0xa, 0x0, 0x0, 0x0, {}, ["", "", "", ""]}, 0xffffffffffffff7a}}, 0x0) 21:08:36 executing program 2: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qrtr-tun\x00', 0x1) write$qrtrtun(r0, &(0x7f0000000080)='g', 0x1) 21:08:36 executing program 3: r0 = timerfd_create(0x9, 0x0) timerfd_gettime(r0, &(0x7f0000000280)) 21:08:36 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:36 executing program 4: fsopen(&(0x7f0000000000)='nfsd\x00', 0x0) 21:08:36 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x2, 0x80481) ioctl$USBDEVFS_BULK(r0, 0x5450, 0x0) 21:08:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x89a0, &(0x7f0000000440)={0x2, 'vlan0\x00', {0x3}}) 21:08:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x4018821) 21:08:36 executing program 4: recvmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) 21:08:36 executing program 3: set_mempolicy(0x0, &(0x7f0000000000), 0x0) 21:08:36 executing program 5: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}, {0x14}}}, 0x30}}, 0x0) 21:08:36 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x571}]}) 21:08:37 executing program 5: r0 = socket(0x1e, 0x2, 0x0) bind$netrom(r0, 0x0, 0x0) 21:08:37 executing program 2: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x7bdf878da25b54dc) 21:08:37 executing program 4: r0 = socket(0x10, 0x2, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x10e, 0x4, 0x0, 0x0) 21:08:37 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x10, &(0x7f0000000480)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:08:37 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:37 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x2, 0x602) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev}}}, 0x30) 21:08:37 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x401070c9, 0xffffffffffffffff) 21:08:37 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x120c0) 21:08:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffcbd, &(0x7f00000000c0)={&(0x7f0000000080)={0x15, 0x0, 0x0, 0x0, 0x0, {{}, {0x0, 0xb}, {0x14}}}, 0x15}}, 0x0) 21:08:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000440)={0x8, 'vlan0\x00'}) 21:08:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x8030ae7c, 0x0) 21:08:37 executing program 5: r0 = socket(0x22, 0x2, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 21:08:37 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:37 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000600)={0x18, 0x1402, 0x43d, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 21:08:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0xd, 0x0, &(0x7f00000001c0)) 21:08:37 executing program 1: r0 = socket(0x2, 0x3, 0x100) recvmsg$can_j1939(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) 21:08:37 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:37 executing program 3: r0 = socket(0x2a, 0x2, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, 0x0) 21:08:37 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x480, &(0x7f0000001280)=""/4096, &(0x7f0000000040)=0x1000) 21:08:37 executing program 2: r0 = socket(0x2a, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}}, 0x0) 21:08:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x1}) 21:08:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x1, 0x4) sendmsg(r0, &(0x7f0000001580)={&(0x7f0000000080)=@in={0x2, 0x4e22, @remote}, 0x80, 0x0}, 0x800) 21:08:37 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:37 executing program 3: socket(0x2c, 0x0, 0x0) 21:08:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() 21:08:37 executing program 5: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1e, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) 21:08:38 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:38 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448cb, &(0x7f0000000280)) 21:08:38 executing program 2: r0 = socket(0x28, 0x1, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:08:38 executing program 5: r0 = socket(0x2, 0x1, 0x106) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 21:08:38 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000040), 0x4) 21:08:38 executing program 3: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x89a0, &(0x7f0000000000)={'vlan1\x00'}) 21:08:38 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:38 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f0000001640)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 21:08:38 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)={0x24, 0x14, 0x759, 0x0, 0x0, {0x10}, [@INET_DIAG_REQ_BYTECODE={0xd, 0x1, "8194665512815a1bab"}]}, 0x24}}, 0x0) 21:08:38 executing program 3: r0 = socket$rds(0xa, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001780)={&(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001500)=[{&(0x7f00000017c0)=""/4096, 0x1000}], 0x1}, 0x0) 21:08:38 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8901, &(0x7f0000000000)={'ip_vti0\x00'}) 21:08:38 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:38 executing program 1: r0 = socket(0x21, 0x2, 0xa) connect$netrom(r0, 0x0, 0x0) [ 1652.588653][T25525] exfat: Bad value for 'gid' 21:08:38 executing program 5: r0 = socket(0xa, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, 0x24) [ 1652.648847][T25525] exfat: Bad value for 'gid' 21:08:38 executing program 1: r0 = socket(0xa, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x0) 21:08:38 executing program 2: r0 = socket(0x2a, 0x2, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, 0x0) 21:08:39 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_dccp_int(r0, 0x84, 0x5, 0x0, 0x0) 21:08:39 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8947, &(0x7f00000000c0)={'ip6gre0\x00'}) 21:08:39 executing program 5: r0 = socket(0xa, 0x6, 0x0) connect$tipc(r0, 0x0, 0x0) 21:08:39 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:39 executing program 1: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 21:08:39 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x19, 0x0, 0x0) 21:08:39 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) connect(r0, &(0x7f0000000100)=@sco={0x1f, @none}, 0x80) 21:08:39 executing program 2: r0 = shmget$private(0x0, 0x800000, 0x0, &(0x7f0000800000/0x800000)=nil) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) shmat(r0, &(0x7f000000c000/0x4000)=nil, 0x4000) 21:08:39 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:39 executing program 5: r0 = socket(0x2, 0x1, 0x0) recvfrom$x25(r0, 0x0, 0x0, 0x3, 0x0, 0x0) 21:08:39 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 21:08:39 executing program 1: r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$sock(r0, &(0x7f0000000280)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @mcast2={0xff, 0x3}, 0xffffffff}, 0x80, 0x0}, 0x0) 21:08:39 executing program 4: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x541b, 0x0) 21:08:39 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) 21:08:39 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:39 executing program 5: r0 = socket(0x1, 0x3, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={0x0, 0x10}}, 0x567b6dbd7a2ed871) 21:08:39 executing program 3: r0 = socket(0xa, 0x2, 0x0) bind$netrom(r0, 0x0, 0x0) 21:08:39 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000001500)) 21:08:39 executing program 2: r0 = socket(0xa, 0x3, 0x1) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x41) 21:08:39 executing program 4: r0 = socket(0x15, 0x5, 0x0) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 1653.507292][T25582] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4068aea3, 0x0) 21:08:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='commit=0d']) 21:08:39 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:39 executing program 2: r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8940, &(0x7f0000000180)=@buf) 21:08:39 executing program 1: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) accept(0xffffffffffffffff, &(0x7f00000000c0)=@phonet, &(0x7f0000000140)=0x80) 21:08:39 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x3a) [ 1653.768284][T25599] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:40 executing program 3: getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) 21:08:40 executing program 5: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1e, 0x0, &(0x7f0000000240)) 21:08:40 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:40 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x37c, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0x40045730, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000000c0)={0x0, 0x45, 0x6}) bind$qrtr(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) 21:08:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x1fc}]}) 21:08:40 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x11, 0x1, 0x0, 0x0) 21:08:40 executing program 3: fsopen(&(0x7f0000000000)='fusectl\x00', 0x0) 21:08:40 executing program 5: r0 = socket(0x26, 0x5, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) [ 1654.097673][T25622] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:40 executing program 4: r0 = socket(0xa, 0x2, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0xb, 0x0, &(0x7f0000000200)) 21:08:40 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454ca, 0x401006) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000000)) 21:08:40 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2308d38f295dfe36000000000000000000000000000000000000000000000000b6c6de410f3d4d56a2851537704be259000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000c501000000000000010000000001", 0xca, 0x10000}], 0x0, &(0x7f0000000e80)) 21:08:40 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, 0x0) 21:08:40 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8971, &(0x7f0000000000)={'ip_vti0\x00'}) [ 1654.393145][T25645] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x71aa, &(0x7f0000000080)) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 21:08:40 executing program 2: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0xc, 0x0, &(0x7f0000000240)) 21:08:40 executing program 1: r0 = socket(0xa, 0x6, 0x0) connect$netrom(r0, 0x0, 0x0) 21:08:40 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:40 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, 0x0, 0x0) 21:08:40 executing program 4: r0 = socket(0x2, 0x3, 0x100) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10) 21:08:40 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@empty, @remote}, 0x10) [ 1654.723271][T25664] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x1b, 0x0, &(0x7f0000000180)) 21:08:41 executing program 5: r0 = socket(0x26, 0x5, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, 0x0, 0x0) 21:08:41 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:08:41 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) accept4$x25(r0, 0x0, 0x0, 0x0) 21:08:41 executing program 3: r0 = socket(0x2b, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, 0x0, 0x0) 21:08:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4048ae9b, &(0x7f0000000000)={0x1, 0x0, [{}]}) 21:08:41 executing program 1: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@null=' \x00', 0x0, 'bridge_slave_1\x00'}) [ 1655.048955][T25681] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xae47, 0x0) 21:08:41 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:41 executing program 4: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x14, 0x0, &(0x7f00000001c0)) 21:08:41 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/net\x00') shmat(0x0, &(0x7f0000d67000/0x4000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x5000) shmat(0x0, &(0x7f0000802000/0x4000)=nil, 0x6800) 21:08:41 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x88, 0x68, &(0x7f0000000000), 0x10) 21:08:41 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_TIOCINQ(r0, 0x2, &(0x7f0000000100)) 21:08:41 executing program 5: r0 = socket(0xa, 0x3, 0x1) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 21:08:41 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0x894b, 0x0) 21:08:41 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000380)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) read$proc_mixer(r0, 0x0, 0x0) 21:08:41 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, 0x0, 0x0) [ 1655.519258][T25705] device bond109 entered promiscuous mode 21:08:41 executing program 1: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@broadcast, @local, @remote}, 0xffffffffffffff9c) 21:08:41 executing program 3: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x80047453, 0x0) 21:08:41 executing program 2: capget(&(0x7f0000000780)={0x20071026}, 0x0) [ 1655.578433][T25705] 8021q: adding VLAN 0 to HW filter on device bond109 21:08:41 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4188aea7, &(0x7f0000000000)={0x10, 0x0, [{}]}) 21:08:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000180)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000002580)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000002200)={0x50, 0x0, r1}, 0x50) 21:08:41 executing program 5: r0 = socket(0x2, 0x3, 0xff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={0x0}}, 0x0) [ 1655.747387][T25760] capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure 21:08:42 executing program 3: shmat(0x0, &(0x7f0000009000/0x4000)=nil, 0x7000) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/48) 21:08:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0xc0000101}]}) 21:08:42 executing program 5: r0 = syz_io_uring_setup(0x4667, &(0x7f0000000080)={0x0, 0xbd3a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) r1 = eventfd2(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000180)=r1, 0x1) 21:08:42 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x5460, 0x0) 21:08:42 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00'}) 21:08:42 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) [ 1656.080177][T25777] device bond110 entered promiscuous mode [ 1656.087368][T25777] 8021q: adding VLAN 0 to HW filter on device bond110 21:08:42 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x5421, &(0x7f0000000340)) 21:08:42 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000080)={0x0, 0x1}) 21:08:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_TIOCINQ(r0, 0x8901, &(0x7f0000000100)) 21:08:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, 0x0, 0xffffffffffffff15) 21:08:42 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {{}, {0x0, 0x4107}, {0x14}}}, 0x30}}, 0x0) 21:08:42 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b038"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) [ 1656.332250][T25834] device bond111 entered promiscuous mode [ 1656.338737][T25834] 8021q: adding VLAN 0 to HW filter on device bond111 21:08:42 executing program 1: r0 = socket(0x1e, 0x1, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:08:42 executing program 4: r0 = eventfd(0x0) write$eventfd(r0, &(0x7f0000000080), 0x8) [ 1656.535684][T25877] device bond112 entered promiscuous mode 21:08:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_dccp_int(r0, 0x10e, 0x0, 0x0, 0x0) 21:08:42 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x5, 0x0, &(0x7f0000000180)) [ 1656.616306][T25877] 8021q: adding VLAN 0 to HW filter on device bond112 21:08:42 executing program 3: r0 = socket(0x11, 0x803, 0x0) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000000)={'sit0\x00', @ifru_hwaddr=@dev}) 21:08:42 executing program 1: r0 = socket(0x23, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@setlink={0x28, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_TARGET_NETNSID={0x8}]}, 0x28}}, 0x0) 21:08:42 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b038"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:42 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x88, 0x67, &(0x7f0000000000)={0xffff0000}, 0x10) 21:08:43 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) write$snapshot(r0, &(0x7f0000000080)="0e", 0x1) write$snapshot(r0, 0x0, 0x0) 21:08:43 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0xb, 0x0, 0x0) 21:08:43 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={&(0x7f0000000180)=""/152, 0x0, 0x1000}, 0x20) 21:08:43 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x88, 0x1, 0x0, 0x0) 21:08:43 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_SYNC(r0, 0x5101) 21:08:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x40101283, 0xffffffffffffffff) 21:08:43 executing program 5: syz_open_dev$vcsa(&(0x7f0000008300)='/dev/vcsa#\x00', 0x0, 0x640002) 21:08:43 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, 0x0) [ 1657.104269][T25934] device bond113 entered promiscuous mode [ 1657.137461][T25934] 8021q: adding VLAN 0 to HW filter on device bond113 21:08:43 executing program 2: r0 = socket(0x29, 0x2, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x60}}, 0x4840) 21:08:43 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b038"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:43 executing program 1: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) syz_open_dev$mouse(0x0, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x200800, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) 21:08:43 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x23, 0x0, 0x0) 21:08:43 executing program 3: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ocfs2_control\x00', 0x0, 0x0) read$qrtrtun(r0, 0x0, 0x0) 21:08:43 executing program 5: timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000080)) 21:08:43 executing program 2: r0 = socket(0x11, 0x803, 0x0) recvmsg$can_j1939(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x40000042) 21:08:43 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$can_raw(r0, &(0x7f0000003f40)={0x0, 0x0, 0x0}, 0x1) 21:08:43 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x125e, 0xffffffffffffffff) 21:08:43 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x11, 0x64, &(0x7f00000002c0)={0x3, {{0x2, 0x0, @multicast2}}}, 0x90) 21:08:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netrom(r0, &(0x7f0000000040)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) [ 1657.574395][T25996] device bond114 entered promiscuous mode [ 1657.580631][T25996] 8021q: adding VLAN 0 to HW filter on device bond114 21:08:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0xce}]}) 21:08:43 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000003fc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x2}}], 0x2, 0x0, 0x0) 21:08:44 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000002580)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc0585609, &(0x7f00000025c0)={0x0, 0x0, 0x0, {0x0, @pix_mp}}) 21:08:44 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x17, 0x0, 0x0) 21:08:44 executing program 1: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x6000) clock_gettime(0x0, &(0x7f0000000040)) 21:08:44 executing program 4: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x8, 0x0, &(0x7f0000000180)) 21:08:44 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000000)={'vlan1\x00', @ifru_hwaddr=@multicast}) 21:08:44 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xb701, 0x0) 21:08:44 executing program 1: openat$sndseq(0xffffffffffffff9c, 0x0, 0x410000) [ 1658.060470][T26053] device bond115 entered promiscuous mode 21:08:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1060400, &(0x7f00000004c0)) [ 1658.130106][T26053] 8021q: adding VLAN 0 to HW filter on device bond115 21:08:44 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:44 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000005c0)='/dev/vcsa#\x00', 0x1f, 0x0) accept$inet(r0, 0x0, 0x0) 21:08:44 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x1c02, &(0x7f000096b000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x1000)=nil, 0xd000) r1 = socket(0x23, 0x2, 0x0) bind$isdn(r1, &(0x7f0000000000), 0x6) [ 1658.400897][ T26] audit: type=1800 audit(1601500124.561:75): pid=26118 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.1" name="SYSV00000000" dev="hugetlbfs" ino=0 res=0 errno=0 [ 1658.524390][T26117] device bond116 entered promiscuous mode [ 1658.553301][T26117] 8021q: adding VLAN 0 to HW filter on device bond116 21:08:44 executing program 2: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x16, 0x0, 0x0) 21:08:44 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 21:08:44 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 21:08:44 executing program 3: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x402, 0x88aaf66) 21:08:44 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0x80108906, 0x0) 21:08:44 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:45 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x88, 0x65, &(0x7f0000000000), 0x10) 21:08:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x88, 0xb, &(0x7f0000000000), 0x10) [ 1659.048009][T26166] device bond117 entered promiscuous mode 21:08:45 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/mnt\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xb702, 0x0) 21:08:45 executing program 3: r0 = socket(0x1d, 0x2, 0x2) connect$l2tp(r0, &(0x7f0000000480)={0x2, 0x0, @private}, 0x20000490) 21:08:45 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x894a, &(0x7f0000000000)={'vlan1\x00'}) [ 1659.127622][T26166] 8021q: adding VLAN 0 to HW filter on device bond117 21:08:45 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socket(0x10, 0x80002, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) inotify_init() select(0x40, &(0x7f0000002280), &(0x7f00000022c0)={0x40}, 0x0, 0x0) 21:08:45 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:45 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) 21:08:45 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x101, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 21:08:45 executing program 5: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x4, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) 21:08:45 executing program 2: r0 = socket(0xa, 0x2, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000000)=""/110, &(0x7f0000000080)=0x6e) [ 1659.420968][T26219] device bond118 entered promiscuous mode [ 1659.458920][T26219] 8021q: adding VLAN 0 to HW filter on device bond118 21:08:45 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x4, 0x0, &(0x7f0000000180)) 21:08:45 executing program 1: socketpair(0x29, 0x2, 0xe51, &(0x7f0000000000)) 21:08:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c01, 0xffffffffffffffff) 21:08:45 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 21:08:45 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:45 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x23, &(0x7f0000000040)={0x0}, 0x10) [ 1659.945944][T26275] device bond119 entered promiscuous mode [ 1659.952003][T26275] 8021q: adding VLAN 0 to HW filter on device bond119 21:08:46 executing program 4: r0 = socket(0x2, 0x3, 0x4) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000040)={'caif0\x00', @ifru_settings={0x0, 0x0, @fr_pvc_info=0x0}}) 21:08:46 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x1263, r0) 21:08:46 executing program 3: r0 = socket(0xa, 0x3, 0x1) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 21:08:46 executing program 2: mmap$usbfs(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x7fff) 21:08:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000100)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "6eb73a8ad0d138f2c5f7214faa65422e354eb5d866a07e11ad096f0baba223ac2324cf5e4235809daa565bb4be0ceedaa73e1f8d04276e0cd95e9777"}, 0x45, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 21:08:46 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:46 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x120222) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 21:08:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000062c0)={0x0, 0x0, &(0x7f0000006280)={&(0x7f0000000180)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="2d0b00000000000010000104000004000180"], 0x18}}, 0x0) 21:08:46 executing program 1: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x80047437, 0x0) [ 1660.402178][T26320] device bond120 entered promiscuous mode 21:08:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$wireguard(0x0) 21:08:46 executing program 5: r0 = socket(0x10, 0x80002, 0x0) recvmsg$can_bcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdea}, 0x12022) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000008c0)=ANY=[@ANYBLOB='$\x00\x00\x00jf\a'], 0x24}}, 0x0) [ 1660.484065][T26320] 8021q: adding VLAN 0 to HW filter on device bond120 21:08:46 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000040)) timer_gettime(0x0, &(0x7f0000000180)) 21:08:46 executing program 1: perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:08:46 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:46 executing program 3: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}]}, &(0x7f0000000240)=0x10) 21:08:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x1a0}]}) 21:08:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x3a}]}) [ 1660.753209][T26380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26218 sclass=netlink_route_socket pid=26380 comm=syz-executor.5 21:08:47 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000001180)={0x28, 0x3f7, 0x0, 0x0, 0x0, {0x7, 0x7, './file0', './file0'}}, 0x28}}, 0x0) 21:08:47 executing program 3: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000440)={0x0, @in={0x2, 0x0, @loopback}, @xdp, @xdp, 0x845, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)='ipvlan1\x00'}) [ 1660.835921][T26380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26218 sclass=netlink_route_socket pid=26380 comm=syz-executor.5 21:08:47 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:47 executing program 2: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xd8}}, 0x0) [ 1660.923295][T26385] device bond121 entered promiscuous mode [ 1660.929513][T26385] 8021q: adding VLAN 0 to HW filter on device bond121 21:08:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, 0x0) 21:08:47 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) getsockname(r0, 0x0, 0x0) 21:08:47 executing program 3: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x17, 0x0, 0x0) 21:08:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x13, r1, 0x11, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x2c}}, 0x0) 21:08:47 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f00000001c0)={0x2, 0x0, {&(0x7f0000000300)=""/195, 0xc3, 0x0}}, 0xfffffffffffffd04) 21:08:47 executing program 4: socket$rds(0x15, 0x5, 0x0) select(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, 0x0) 21:08:47 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000300)={0x0, 0x0, 0x0, r0, 0xc}) [ 1661.241827][T26439] device bond122 entered promiscuous mode [ 1661.277954][T26439] 8021q: adding VLAN 0 to HW filter on device bond122 21:08:47 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8947, &(0x7f0000000040)={'ip6_vti0\x00'}) 21:08:47 executing program 3: io_setup(0x9, &(0x7f0000000000)=0x0) r1 = memfd_create(&(0x7f0000000040)='*^$\x00', 0x0) io_submit(r0, 0x1, &(0x7f00000018c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x10, 0x1, 0x0, r1, 0x0}]) 21:08:47 executing program 5: r0 = socket(0x10, 0x80002, 0x0) bind$xdp(r0, 0x0, 0x0) 21:08:47 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:47 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0xc0045878, 0x0) 21:08:47 executing program 1: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) 21:08:47 executing program 5: keyctl$session_to_parent(0x6) 21:08:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_dccp_int(r0, 0x10e, 0x5, 0x0, 0x0) [ 1661.671399][T26506] device bond123 entered promiscuous mode 21:08:47 executing program 2: setreuid(0x0, 0xee01) r0 = socket(0xa, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0xc0045878, 0x0) 21:08:47 executing program 3: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x121200) [ 1661.712705][T26506] 8021q: adding VLAN 0 to HW filter on device bond123 21:08:48 executing program 4: r0 = socket(0x22, 0x2, 0x2) getsockname$packet(r0, 0x0, 0xffffffffffffffff) 21:08:48 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x17, &(0x7f00000002c0)={0x6, {{0x2, 0x0, @multicast2}}}, 0x90) 21:08:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$rds(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, &(0x7f00000019c0)=[@rdma_map={0x30, 0x114, 0x3, {{0x0}, 0x0}}, @mask_fadd={0x58, 0x114, 0x8, {{}, 0x0, 0x0}}], 0x88}, 0x0) 21:08:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000100)={0x1, 0x0, [{0x291}]}) 21:08:48 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d228"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae68, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) 21:08:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "c79c7461ae64fbbf5caa5a1677ff5c8f9c6f4203b82f9be134fc830b0efe9c4b07453fb54d33b7af083123a6bcedd546a49a794e2b229b6635afb509"}, 0x45, 0x0) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[], 0x2f8) 21:08:48 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000000c0)={0x0, 0x8, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1d1b21dd"}, 0x0, 0x0, @userptr}) 21:08:48 executing program 3: socket(0xa, 0x3, 0x200000000000ff) 21:08:48 executing program 3: r0 = socket(0x25, 0x5, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 21:08:48 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) 21:08:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x5, 0x4, 0x24, 0x4}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x5, 0x4, 0x24, 0x4}, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x5, 0x4, 0x24, 0x4}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x6, &(0x7f0000000180)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r2}], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1662.478389][T26575] device bond124 entered promiscuous mode 21:08:48 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f00000001c0)='/dev/video#\x00', 0x4, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0x4014563c, &(0x7f00000000c0)={0xa, 0x0, 0x4, 0x2000, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00\x00\n\x00'}, 0x0, 0x0, @planes=0x0}) 21:08:48 executing program 1: r0 = socket(0xa, 0x6, 0x0) connect$tipc(r0, &(0x7f0000000000)=@id, 0x10) [ 1662.529791][T26575] 8021q: adding VLAN 0 to HW filter on device bond124 21:08:48 executing program 3: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x90, 0x0, 0xffffffffffffff9c, 0x0) 21:08:48 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d228"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x23, 0x0, &(0x7f0000000180)) 21:08:48 executing program 4: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8983, &(0x7f0000000180)=@buf) 21:08:48 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'dummy0\x00', {0x2, 0x0, @local}}) 21:08:48 executing program 5: r0 = gettid() r1 = gettid() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000040)) 21:08:49 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000040)="d09bc55f", 0x4) 21:08:49 executing program 2: r0 = socket(0xa, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 21:08:49 executing program 4: bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) 21:08:49 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) [ 1662.904820][T26647] device bond125 entered promiscuous mode [ 1662.913604][T26647] 8021q: adding VLAN 0 to HW filter on device bond125 21:08:49 executing program 3: r0 = socket(0xa, 0x6, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x10d, 0xd, 0x0, 0x0) 21:08:49 executing program 5: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x24, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) 21:08:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x1b, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:08:49 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d228"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:49 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffff54, 0x40000041, 0x0, 0xffffffffffffff75) 21:08:49 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8947, &(0x7f0000000000)={'syzkaller0\x00'}) 21:08:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x561}]}) 21:08:49 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_dccp_int(r0, 0x84, 0x0, 0x0, 0x1000000) 21:08:49 executing program 5: r0 = gettid() ptrace$peek(0xffffffffffffffff, r0, 0x0) 21:08:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0xa, 0xd0e0000, 0x0, 0x100, 0x2c0, 0x1d8, 0x1d8, 0x2c0, 0x1d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x230, 0x0, {}, [@common=@inet=@policy={{0x158, 'policy\x00'}, {[{@ipv6=@dev, [], @ipv6=@empty}, {@ipv4, [], @ipv6=@private2}, {@ipv6=@mcast2, [], @ipv6=@private1}, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, [], @ipv6=@mcast1}]}}, @common=@unspec=@connlabel={{0x28, 'connlabel\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 21:08:49 executing program 5: r0 = socket(0x29, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@buf) 21:08:49 executing program 1: io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, 0x0, 0x1) 21:08:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_dccp_int(r0, 0x10e, 0x8, 0x0, 0x0) [ 1663.473777][T26703] device bond126 entered promiscuous mode [ 1663.492420][T26703] 8021q: adding VLAN 0 to HW filter on device bond126 21:08:49 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) 21:08:49 executing program 4: setreuid(0x0, 0xee01) r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000080)={'sit0\x00', 0x0}) 21:08:49 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, r0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_pktinfo(r1, 0x6, 0x17, 0xfffffffffffffffd, &(0x7f0000000040)=0x2) 21:08:49 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 21:08:49 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0xf, &(0x7f0000000000), 0x10) 21:08:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x12, 0x0, 0x3}]}) [ 1663.773573][T26773] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:50 executing program 5: socket$xdp(0x2c, 0x3, 0x0) socket$xdp(0x2c, 0x3, 0x0) 21:08:50 executing program 4: prctl$PR_GET_TSC(0x19, &(0x7f0000001700)) 21:08:50 executing program 2: r0 = fsopen(&(0x7f0000000000)='exfat\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000080)='afs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c) 21:08:50 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:50 executing program 1: r0 = socket(0x10, 0x80002, 0x4) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000400)=@bridge_setlink={0x64, 0x12, 0x511, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_VFINFO_LIST={0x38, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14}]}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14}]}]}]}, 0x64}}, 0x0) 21:08:50 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000005c0)={0x2020}, 0x2020) write$UHID_DESTROY(r0, &(0x7f0000000580), 0x3fffff) 21:08:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="10000000730001"], 0x34}}, 0x0) 21:08:50 executing program 5: socket(0x10, 0x2, 0x97ad) 21:08:50 executing program 1: r0 = socket(0xa, 0x6, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0x0) [ 1664.058368][T26793] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:50 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x7bde799dbf6bccd5, 0x0, 0x0) 21:08:50 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) [ 1664.146113][T26798] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=26798 comm=syz-executor.4 21:08:50 executing program 3: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) 21:08:50 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454ca, 0x400000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000000)=r1) 21:08:50 executing program 4: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x19, 0x0, 0x0) 21:08:50 executing program 1: r0 = socket(0x25, 0x80001, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:08:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x140, 0x0) [ 1664.315846][T26807] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:50 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:50 executing program 3: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 21:08:50 executing program 1: r0 = socket(0x25, 0x80001, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:08:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0xa, 0x0, &(0x7f0000000180)) 21:08:50 executing program 5: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8923, &(0x7f0000000140)={'team_slave_1\x00'}) 21:08:50 executing program 4: keyctl$session_to_parent(0x19) 21:08:50 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8947, &(0x7f0000000000)={'ip_vti0\x00'}) [ 1664.647877][T26823] bond127 (uninitialized): Released all slaves 21:08:50 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r0, &(0x7f0000003940)={&(0x7f0000003600)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000003840)=[@zcopy_cookie={0x18}], 0x18}, 0x4000000) 21:08:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff76) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x4a) 21:08:50 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x891d, &(0x7f0000000000)={'ip_vti0\x00'}) 21:08:50 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:50 executing program 5: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x2b, 0x0, 0x0) 21:08:51 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x10, &(0x7f0000000000), 0x10) 21:08:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x3, &(0x7f0000346fc8)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) 21:08:51 executing program 5: r0 = socket(0x1e, 0x2, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x80c0) [ 1664.929798][T26846] bond127 (uninitialized): Released all slaves 21:08:51 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc208ae62, 0x0) 21:08:51 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snd/seq\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 21:08:51 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) recvfrom$inet(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 21:08:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x1269, 0xffffffffffffffff) [ 1665.254493][T26862] bond127 (uninitialized): Released all slaves 21:08:52 executing program 2: r0 = socket(0x2, 0x3, 0xff) read$midi(r0, 0x0, 0x0) 21:08:52 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:52 executing program 5: r0 = socket(0x2, 0x1, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000003c40)={0x0, "8c04c274a967433491b54daea5e9b1d70c6165cd1e39c341abbe401a998dcef4bc00a942b735d419b8054a70fbde62c272727bde5d60da396820c90da99d45638fda247dc3e56ac52e83ed4fed688999fff9ccff29c5ddf638d8af1d9e9f6789cdc731644268bd75e6a0236b04c61cd551040a83f5f6a280b21e8b9ff6edc10c"}) 21:08:52 executing program 1: r0 = socket(0x2, 0x3, 0xff) connect$rds(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 21:08:52 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8981, 0x0) 21:08:52 executing program 3: r0 = socket(0xa, 0x2, 0x0) bind$xdp(r0, 0x0, 0x17) 21:08:52 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:52 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000740)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x17c2}}, 0x18) 21:08:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002400)={0x2020}, 0x2020) socket$packet(0x11, 0x0, 0x300) socket(0x0, 0x5, 0x0) accept(0xffffffffffffffff, &(0x7f00000000c0)=@phonet, 0x0) 21:08:52 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000400)=@bridge_setlink={0x20, 0x12, 0x511}, 0x20}}, 0x0) 21:08:52 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, 0x0) 21:08:52 executing program 1: r0 = getpgrp(0x0) migrate_pages(r0, 0x2, 0x0, &(0x7f00000000c0)=0x3) 21:08:52 executing program 2: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={0x0, 0xd8}}, 0x0) 21:08:52 executing program 4: connect$pppoe(0xffffffffffffffff, 0x0, 0x0) 21:08:52 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x401, 0x0) read$FUSE(r0, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) setreuid(0x0, r1) socket(0xa, 0x3, 0x1) 21:08:52 executing program 1: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x541b, 0x0) 21:08:52 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0xff51, 0x0, 0x0, 0x0, 0x0, {0x25}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 21:08:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x572}]}) 21:08:52 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:52 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r0, &(0x7f00000000c0)={0x2a, 0x1, 0x4000}, 0xc) 21:08:52 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0xc004743e, &(0x7f0000000340)) 21:08:52 executing program 1: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000100)={0x9}, 0x0, 0x0) 21:08:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x4000009f}]}) 21:08:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x13, 0x0, &(0x7f00000001c0)) 21:08:52 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:52 executing program 1: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x13, 0x0, &(0x7f0000000240)) 21:08:52 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8921, &(0x7f0000000000)={'ip_vti0\x00'}) 21:08:53 executing program 3: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000025c0)=@bpf_lsm={0x9, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 21:08:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 21:08:53 executing program 2: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x2, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) 21:08:53 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:53 executing program 4: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x13, 0x0, 0x0) 21:08:53 executing program 1: syz_mount_image$jffs2(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000002600)='./file0/../file0\x00', 0x0, 0x0) 21:08:53 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) read$char_raw(r0, &(0x7f0000000200)={""/3059}, 0xc00) read$char_raw(r0, &(0x7f0000001000)={""/28613}, 0x7000) 21:08:53 executing program 2: keyctl$session_to_parent(0x1e) 21:08:53 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:53 executing program 4: r0 = socket(0xa, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x541b, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 21:08:53 executing program 1: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x19, 0x0, &(0x7f0000000180)) 21:08:53 executing program 3: r0 = socket(0x1e, 0x5, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:08:53 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000cc0)={@multicast1, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) 21:08:53 executing program 3: r0 = socket(0x29, 0x2, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 21:08:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f00000064c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2042, 0x0) [ 1667.372056][ T26] audit: type=1400 audit(1601500133.531:76): avc: denied { getattr } for pid=26993 comm="syz-executor.4" path="socket:[128294]" dev="sockfs" ino=128294 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 21:08:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4188aea7, &(0x7f0000000000)={0x2, 0x0, [{0x27e}, {0x864}]}) [ 1667.424633][T26997] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:53 executing program 1: syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0, 0x0) 21:08:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4008ae61, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) 21:08:53 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:53 executing program 2: r0 = socket(0xa, 0x1, 0x106) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x8080) 21:08:53 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8903, &(0x7f0000003900)={'batadv0\x00'}) 21:08:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454ca, 0x401006) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xb) 21:08:54 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x70, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 1667.786520][T27026] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:54 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c000000100085060000", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:54 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00'}) 21:08:54 executing program 1: r0 = socket(0x22, 0x2, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, &(0x7f00000000c0)) 21:08:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x560}]}) 21:08:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0xa, &(0x7f00000002c0)={0x6, {{0x2, 0x0, @multicast2}}}, 0x90) 21:08:54 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000440)='/dev/nvram\x00', 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@ng, 0x2, 0x3) [ 1668.066447][T27046] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:54 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, 0x0, 0x0) 21:08:54 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:54 executing program 3: keyctl$session_to_parent(0x1c) 21:08:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x1267, 0xffffffffffffffff) 21:08:54 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x800000) 21:08:54 executing program 4: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x15, 0x0, 0x0) 21:08:54 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x990, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, 0x0}, 0x78) 21:08:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="34000000258001"], 0x34}}, 0x0) [ 1668.425766][T27075] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:54 executing program 5: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x4000) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000140)) shmat(0x0, &(0x7f0000000000/0x1000)=nil, 0xd000) 21:08:54 executing program 2: r0 = io_uring_setup(0x3125, &(0x7f0000000cc0)) mmap$IORING_OFF_CQ_RING(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x9, 0x13, r0, 0x8000000) add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) 21:08:54 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) [ 1668.569715][T27082] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32805 sclass=netlink_route_socket pid=27082 comm=syz-executor.3 21:08:54 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, 0x0) 21:08:54 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) inotify_rm_watch(r0, 0x0) 21:08:54 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) [ 1668.694856][ T26] audit: type=1800 audit(1601500134.861:77): pid=27088 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.5" name="SYSV00000000" dev="hugetlbfs" ino=0 res=0 errno=0 21:08:54 executing program 5: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'macvtap0\x00'}) 21:08:55 executing program 2: r0 = socket(0xa, 0x2, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x67, 0x0, &(0x7f0000000200)) [ 1668.791459][T27097] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:55 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:55 executing program 1: r0 = socket$inet(0x2, 0x6, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 21:08:55 executing program 3: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x10, 0x0, 0x0) 21:08:55 executing program 4: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 1668.982509][T27109] macvtap0: mtu less than device minimum 21:08:55 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x3}) 21:08:55 executing program 5: r0 = socket(0x28, 0x1, 0x0) bind$isdn_base(r0, 0x0, 0x0) 21:08:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) [ 1669.032419][T27113] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:55 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x6) 21:08:55 executing program 4: r0 = socket(0x1e, 0x2, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={0x0}}, 0x80c0) 21:08:55 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb6775", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:55 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x602) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev}}}, 0x30) 21:08:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8903, &(0x7f0000000040)) 21:08:55 executing program 3: r0 = socket(0xa, 0x6, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:08:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, 0x0, 0x0) 21:08:55 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'team0\x00', {0x2, 0x0, @remote}}) [ 1669.345529][T27132] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:55 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb6775", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:55 executing program 2: r0 = socket(0x1, 0x3, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x10}}, 0x0) 21:08:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xae03, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) 21:08:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast1}}) 21:08:55 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x89b1, &(0x7f0000000000)={'vlan1\x00'}) 21:08:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="050300dfffffb761ffff08000000080003"], 0x1c}}, 0x0) [ 1669.680412][T27148] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:55 executing program 3: r0 = shmget$private(0x0, 0x4000, 0x1c02, &(0x7f000096b000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x1000)=nil, 0xc000) 21:08:55 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x37c, 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0x40045731, &(0x7f0000000040)) 21:08:56 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb6775", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x6e0}]}) 21:08:56 executing program 5: r0 = socket(0x1, 0x3, 0x0) accept$netrom(r0, 0x0, 0x0) 21:08:56 executing program 4: r0 = socket(0x2, 0x3, 0xff) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) 21:08:56 executing program 2: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0xe69c0) [ 1669.959164][T27170] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1669.969893][ T26] audit: type=1800 audit(1601500136.131:78): pid=27172 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.3" name="SYSV00000000" dev="hugetlbfs" ino=5 res=0 errno=0 21:08:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="1103000000000000000002"], 0x2c}}, 0x0) 21:08:56 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x17b}]}) 21:08:56 executing program 4: r0 = socket(0xa, 0x3, 0x1) setsockopt$netrom_NETROM_T1(r0, 0x29, 0x1, 0x0, 0x0) 21:08:56 executing program 1: r0 = socket(0xa, 0x6, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x10d, 0x1, 0x0, 0x0) [ 1670.172722][ T26] audit: type=1800 audit(1601500136.331:79): pid=27187 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="vcsa0" dev="sda1" ino=16370 res=0 errno=0 21:08:56 executing program 2: r0 = socket(0xa, 0x6, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x0, @remote, 'team_slave_0\x00'}}, 0x1e) [ 1670.258848][T27193] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0xc0189436, 0x0) 21:08:56 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:56 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8932, &(0x7f0000000000)={'ip_vti0\x00'}) 21:08:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0xda0}]}) [ 1670.386559][T27203] do_dccp_setsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 21:08:56 executing program 5: r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x80108906, 0x0) 21:08:56 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x84fb, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f00000019c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 21:08:56 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x88, 0x67, 0x0, 0x0) [ 1670.541142][T27214] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:56 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x88, 0x2, 0x0, 0x0) 21:08:56 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000200)) 21:08:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="f8000000", @ANYRES16=r1, @ANYBLOB="01002cbd7000fddbdf25250000000e0001006e65746465", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e6574646576", @ANYRES32, @ANYBLOB="08000100", @ANYRES32], 0xf8}}, 0x0) 21:08:57 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x4, {0xa, 0x0, 0x0, @mcast1}}}, 0x3a) 21:08:57 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8933, &(0x7f0000000000)={'ip_vti0\x00'}) 21:08:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x2c}]}) [ 1670.875235][T27234] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 21:08:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, 0x0) 21:08:57 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) bind$l2tp6(r1, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r4, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r5, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:57 executing program 4: syz_mount_image$exfat(&(0x7f0000000000)='exfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)) 21:08:57 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000000), 0x10) 21:08:57 executing program 1: syz_mount_image$affs(&(0x7f00000004c0)='affs\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[]) 21:08:57 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000001800)={{0x1, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 'id0\x00', 'timer1\x00'}) 21:08:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x40000108}]}) 21:08:57 executing program 2: r0 = syz_open_dev$vim2m(&(0x7f0000002580)='/dev/video#\x00', 0x4, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc0205649, &(0x7f00000025c0)={0x0, 0x0, 0x0, {0x0, @pix_mp}}) 21:08:57 executing program 3: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x409, 0x0) 21:08:57 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, 0x0, 0x0) 21:08:57 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x21) [ 1671.379230][T27262] device bond127 entered promiscuous mode 21:08:57 executing program 4: r0 = socket(0x11, 0x2, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, 0x0, 0x0) [ 1671.435164][T27262] 8021q: adding VLAN 0 to HW filter on device bond127 21:08:57 executing program 3: r0 = socket(0x1, 0x2, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, 0x0) 21:08:57 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) bind$l2tp6(r1, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r4, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r5, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:57 executing program 2: socket(0x1d, 0x2, 0x2) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x3}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vxcan={{0xa, 0x1, 'vxcan\x00'}, {0x18, 0x2, 0x0, 0x1, @val={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x4085}}}}}}]}, 0x48}}, 0x0) 21:08:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x5452, &(0x7f0000000000)) 21:08:57 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000140)={'bond0\x00', @ifru_map}) 21:08:57 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$qrtr(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[], 0x3d0}, 0x38, 0x0) write$nbd(r1, &(0x7f0000000340), 0x10) 21:08:57 executing program 3: r0 = socket(0x2, 0x3, 0x100) bind$xdp(r0, 0x0, 0x0) 21:08:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001580)={&(0x7f0000000080)=@in={0x2, 0x4e22, @remote}, 0x80, 0x0}, 0x800) 21:08:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, 0x0) [ 1671.857785][T27328] device bond128 entered promiscuous mode [ 1671.881786][T27328] 8021q: adding VLAN 0 to HW filter on device bond128 21:08:58 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8919, &(0x7f0000003900)={'batadv0\x00'}) 21:08:58 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x88, 0x68, &(0x7f0000000000)={0xffff0000}, 0x10) 21:08:58 executing program 2: r0 = socket(0xa, 0x2, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x64, 0x0, &(0x7f0000000200)) 21:08:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@raw={'raw\x00', 0x8, 0x3, 0x358, 0x0, 0xa, 0xd0e0000, 0x0, 0x100, 0x2c0, 0x1d8, 0x1d8, 0x2c0, 0x1d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x1f0, 0x230, 0x0, {}, [@common=@inet=@policy={{0x180, 'policy\x00'}, {[{@ipv6=@dev, [], @ipv6=@empty}, {@ipv4, [], @ipv6=@private2}, {@ipv6=@mcast2, [], @ipv6=@private1}, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, [], @ipv6=@mcast1}]}}, @common=@unspec=@connlabel={{0x28, 'connlabel\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 21:08:58 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) bind$l2tp6(r1, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r4, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r5, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r5}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:08:58 executing program 3: r0 = gettid() kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) 21:08:58 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 21:08:58 executing program 1: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) [ 1672.162115][T27392] x_tables: ip_tables: policy.0 match: invalid size 312 (kernel) != (user) 352 21:08:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x400000b0}]}) 21:08:58 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x53, &(0x7f0000001280)=""/4096, &(0x7f0000000040)=0x7) 21:08:58 executing program 5: r0 = socket(0xa, 0x5, 0x0) connect(r0, &(0x7f0000000480)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) [ 1672.324526][T27390] device bond129 entered promiscuous mode 21:08:58 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="6d616e67b665000000000000000000000000000000000000000000000000000003"], 0x58) 21:08:58 executing program 3: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') ioctl$SIOCSIFMTU(r0, 0x8931, &(0x7f0000000140)={'team_slave_1\x00'}) 21:08:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, r1}}, 0x48) [ 1672.380026][T27390] 8021q: adding VLAN 0 to HW filter on device bond129 21:08:58 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 21:08:58 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x80000) 21:08:58 executing program 2: socket(0x10, 0x3, 0x1) [ 1672.682559][T27454] device bond130 entered promiscuous mode [ 1672.697488][T27454] 8021q: adding VLAN 0 to HW filter on device bond130 21:08:58 executing program 1: openat$audio(0xffffffffffffff9c, 0x0, 0x400002, 0x0) [ 1672.726180][T27447] device lo entered promiscuous mode 21:08:59 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 21:08:59 executing program 4: io_setup(0x400, &(0x7f0000000080)=0x0) r1 = syz_io_uring_setup(0x57ca, &(0x7f0000000000), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 21:08:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, 0x0) syz_genetlink_get_family_id$wireguard(0x0) 21:08:59 executing program 1: r0 = socket(0xa, 0x3, 0x2) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x188}}, 0x20000097) 21:08:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xae41, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) 21:08:59 executing program 1: socketpair(0x2c, 0x3, 0x4057, &(0x7f0000000000)) [ 1673.546656][T27464] Y­4`Ò˜: renamed from lo [ 1673.640493][T27510] device bond131 entered promiscuous mode 21:08:59 executing program 3: r0 = socket(0x23, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000180)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={0x0}}, 0x0) 21:08:59 executing program 2: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1c, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) 21:08:59 executing program 4: r0 = socket(0x2, 0x3, 0x1) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, 0x0, 0x0) 21:08:59 executing program 1: r0 = socket(0xa, 0x2, 0x0) recvmsg$can_j1939(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x160) 21:08:59 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl$SIOCPNDELRESOURCE(r0, 0x8936, 0x0) [ 1673.693384][T27510] 8021q: adding VLAN 0 to HW filter on device bond131 21:08:59 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 21:09:00 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 21:09:00 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_dccp_int(r0, 0x84, 0x82, 0x0, 0x0) 21:09:00 executing program 1: socket(0x23, 0x5, 0x0) fanotify_init(0x0, 0x0) socket(0x23, 0x5, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x44b, 0x0) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x61}, &(0x7f0000000100)={0x0, 0x989680}, 0x0) 21:09:00 executing program 4: r0 = socket(0x2, 0x3, 0x1) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x29, 0x0, 0x0) 21:09:00 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x1403, 0x1}, 0x10}}, 0x0) 21:09:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) connect$nfc_raw(r0, &(0x7f0000000000), 0x10) 21:09:00 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) getsockname(r0, 0x0, &(0x7f0000000180)) 21:09:00 executing program 4: setreuid(0x0, 0xee01) r0 = socket(0xa, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 21:09:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4188aea7, &(0x7f0000000000)={0x500, 0x0, [{}]}) 21:09:00 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ifreq(r0, 0x541b, 0x0) 21:09:00 executing program 1: r0 = socket(0xa, 0x2, 0x0) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @none}, 0x8) [ 1674.451671][T27581] device bond132 entered promiscuous mode [ 1674.503305][T27581] 8021q: adding VLAN 0 to HW filter on device bond132 21:09:00 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 21:09:00 executing program 2: r0 = socket(0xa, 0x5, 0x0) connect(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80) 21:09:00 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:00 executing program 5: r0 = socket(0x1, 0x80001, 0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 21:09:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f00000013c0)=[{{0x0, 0x0, &(0x7f00000012c0)=[{0x0}, {&(0x7f0000000040)=""/92, 0x5c}], 0x2}}], 0x1, 0x0, 0x0) 21:09:00 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000140)={0x1, 0x10, [0x0, 0x0, 0x0, 0x0]}) 21:09:00 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) 21:09:01 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:01 executing program 5: r0 = socket(0x23, 0x5, 0x0) recvmsg$can_bcm(r0, &(0x7f0000001400)={0x0, 0x0, 0x0}, 0x10040) [ 1674.882453][T27662] device bond133 entered promiscuous mode [ 1674.917959][T27662] 8021q: adding VLAN 0 to HW filter on device bond133 21:09:01 executing program 3: r0 = socket(0x2, 0x3, 0x4) ioctl$sock_ifreq(r0, 0x890d, 0x0) 21:09:01 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f00000000c0)={0x0, 0x1, "0c8466"}) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f00000000c0)={{}, 0x0, 0x0, 0x0}) 21:09:01 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) accept(r0, 0x0, 0x0) 21:09:01 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 21:09:01 executing program 5: socket$nl_rdma(0x10, 0x3, 0x14) select(0x40, &(0x7f0000000040), &(0x7f0000000180)={0x9}, 0x0, 0x0) 21:09:01 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8982, &(0x7f0000003900)={'batadv0\x00'}) 21:09:01 executing program 1: r0 = socket(0x23, 0x2, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x2140, 0x0, 0x0) 21:09:01 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:01 executing program 2: r0 = socket(0x10, 0x80002, 0x4) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000400)=@bridge_setlink={0x50, 0x12, 0x511, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_VFINFO_LIST={0x24, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14}]}]}, {0x4}]}]}, 0x50}}, 0x0) 21:09:01 executing program 5: ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000180)=@buf) shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) r0 = shmget$private(0x0, 0x800000, 0x0, &(0x7f0000800000/0x800000)=nil) shmat(r0, &(0x7f0000000000/0x1000)=nil, 0xd000) 21:09:01 executing program 1: r0 = socket(0x1, 0x1, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1675.449452][T27722] device bond134 entered promiscuous mode [ 1675.481682][T27722] 8021q: adding VLAN 0 to HW filter on device bond134 21:09:01 executing program 3: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x12, 0x0, &(0x7f00000001c0)) 21:09:01 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={{0x3, @bcast}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 21:09:01 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 21:09:01 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:01 executing program 5: syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') shmat(0x0, &(0x7f0000802000/0x4000)=nil, 0x6800) shmat(0x0, &(0x7f0000d67000/0x4000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x5000) 21:09:01 executing program 1: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0xb, 0x0, 0x0) 21:09:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000100)=@v2, 0x9, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) 21:09:02 executing program 2: r0 = socket(0x11, 0x2, 0x0) connect$netrom(r0, 0x0, 0x0) [ 1675.847036][T27780] device bond135 entered promiscuous mode 21:09:02 executing program 5: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) memfd_create(&(0x7f0000000000)='devlink\x00', 0x0) 21:09:02 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:02 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000000c0)={'ip6gre0\x00'}) [ 1675.917454][T27780] 8021q: adding VLAN 0 to HW filter on device bond135 21:09:02 executing program 2: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x11, 0x0, &(0x7f00000001c0)) 21:09:02 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 21:09:02 executing program 5: r0 = socket(0x10, 0x80002, 0x4) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000400)=@bridge_setlink={0x5c, 0x12, 0x511, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14}]}]}, {0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc}]}]}]}, 0x5c}}, 0x0) 21:09:02 executing program 3: r0 = socket(0x2, 0x3, 0xff) bind$rds(r0, &(0x7f0000000140)={0xa, 0x0, @broadcast}, 0x10) 21:09:02 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:02 executing program 1: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x3, 0x0, &(0x7f0000000240)) 21:09:02 executing program 2: r0 = socket(0x2, 0x3, 0x4) ioctl$sock_ifreq(r0, 0x0, 0x0) 21:09:02 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 1676.327628][T27851] device bond136 entered promiscuous mode [ 1676.340765][T27851] 8021q: adding VLAN 0 to HW filter on device bond136 21:09:02 executing program 3: r0 = socket(0x2, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x0, @broadcast, 'veth0_to_hsr\x00'}}, 0x1e) 21:09:02 executing program 5: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x541b, &(0x7f0000000140)={'ip6_vti0\x00', 0x0}) 21:09:02 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_dccp_int(r0, 0x10e, 0xb, 0x0, 0x0) 21:09:02 executing program 1: syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x8040) 21:09:02 executing program 5: r0 = socket(0x10, 0x80002, 0x0) bind$xdp(r0, &(0x7f0000000100), 0x10) 21:09:02 executing program 5: r0 = socket(0xa, 0x3, 0x3a) sendmmsg$unix(r0, &(0x7f0000001780)=[{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000100)="56eaa18f13be6f7d15a43bfe832a88fb4ced47f3692cb8c63aa10ee378fa25f96a3db10b042b6676e51fccf134b66f77", 0x30}], 0x1}], 0x1, 0x0) 21:09:02 executing program 3: r0 = socket(0x11, 0x803, 0x0) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000000)={'tunl0\x00', @ifru_names}) 21:09:03 executing program 4: io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 21:09:03 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x480, 0x0, &(0x7f0000000040)) [ 1676.793719][T27903] device bond137 entered promiscuous mode 21:09:03 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, 0x0, 0x78) [ 1676.855467][T27903] 8021q: adding VLAN 0 to HW filter on device bond137 21:09:03 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 21:09:03 executing program 5: r0 = socket(0xa, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x5411, 0x0) 21:09:03 executing program 3: semget(0x2, 0x3d9bea36242cff7c, 0x0) 21:09:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x4b564d03}]}) 21:09:03 executing program 1: r0 = socket(0x29, 0x5, 0x0) sendto$netrom(r0, &(0x7f0000000580)="9c", 0x1, 0x0, 0x0, 0x0) 21:09:03 executing program 4: io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 21:09:03 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000080)) 21:09:03 executing program 3: r0 = socket(0xa, 0x3, 0x2) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 21:09:03 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, &(0x7f0000003900)={'batadv0\x00'}) [ 1677.251115][T27969] device bond138 entered promiscuous mode 21:09:03 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8903, 0x0) 21:09:03 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, 0x0, 0x0) 21:09:03 executing program 2: r0 = socket(0x18, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) [ 1677.300234][T27969] 8021q: adding VLAN 0 to HW filter on device bond138 21:09:03 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:09:03 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x4, 0x0, 0x0) 21:09:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000440)={0x9, 'vlan0\x00'}) 21:09:03 executing program 4: io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}, 0x0]) 21:09:03 executing program 2: r0 = socket(0x18, 0x0, 0x2) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 21:09:03 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) recvfrom$l2tp(r0, 0x0, 0x0, 0x40002060, 0x0, 0x0) 21:09:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000180)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000080)) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000002580)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) write$FUSE_INIT(r0, &(0x7f0000002200)={0x50, 0x0, r2}, 0x50) 21:09:03 executing program 5: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vcan0\x00'}) [ 1677.678914][T28036] device bond139 entered promiscuous mode 21:09:03 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x40000000}]}) [ 1677.758206][T28036] 8021q: adding VLAN 0 to HW filter on device bond139 21:09:04 executing program 5: io_setup(0x400, &(0x7f0000000080)=0x0) r1 = socket$rds(0x15, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 21:09:04 executing program 1: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000040)) 21:09:04 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:09:04 executing program 3: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@buf) 21:09:04 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:04 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x1c02, &(0x7f000096b000/0x4000)=nil) shmat(r0, &(0x7f0000000000/0x1000)=nil, 0xd000) shmat(0x0, &(0x7f0000003000/0x3000)=nil, 0x0) 21:09:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454ca, 0x401006) ioctl$TUNSETVNETHDRSZ(r0, 0x400454de, &(0x7f0000000000)) 21:09:04 executing program 5: r0 = socket(0x10, 0x80002, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000200)) [ 1678.140654][T28097] device bond140 entered promiscuous mode [ 1678.182580][ T26] audit: type=1800 audit(1601500144.341:80): pid=28144 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=4 res=0 errno=0 [ 1678.186507][T28097] 8021q: adding VLAN 0 to HW filter on device bond140 21:09:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="050300dfffffb761ffff08"], 0x1c}}, 0x0) [ 1678.281415][ T26] audit: type=1800 audit(1601500144.381:81): pid=28144 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=5 res=0 errno=0 21:09:04 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x79}]}) 21:09:04 executing program 3: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) r0 = socket(0x23, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@buf) 21:09:04 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:09:04 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/pid\x00') setns(r0, 0x0) 21:09:04 executing program 2: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x21, 0x0, &(0x7f0000000040)) 21:09:04 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000080)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) [ 1678.729840][T28165] device bond141 entered promiscuous mode 21:09:04 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) read$char_raw(r0, &(0x7f0000000200)={""/23997}, 0x5e00) read$char_raw(r0, 0x0, 0x0) [ 1678.784948][T28165] 8021q: adding VLAN 0 to HW filter on device bond141 21:09:05 executing program 5: r0 = syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x0) 21:09:05 executing program 2: r0 = socket(0xa, 0x3, 0x7) sendmsg$rds(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) 21:09:05 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x40000}, 0x0) 21:09:05 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:09:05 executing program 1: r0 = socket(0x1, 0x2, 0x0) recvfrom$l2tp(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:05 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000080)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454ca, 0x401006) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d4, &(0x7f0000000000)) 21:09:05 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x5, 0x0, 0x0) 21:09:05 executing program 3: r0 = socket(0xa, 0x6, 0x0) bind$netrom(r0, 0x0, 0x0) [ 1679.270760][T28235] device bond142 entered promiscuous mode 21:09:05 executing program 2: socket(0x2b, 0x1, 0x9) 21:09:05 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000080)=0x0) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) [ 1679.314831][T28235] 8021q: adding VLAN 0 to HW filter on device bond142 21:09:05 executing program 5: r0 = socket(0x1e, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x89a0, &(0x7f0000000080)={'macvlan1\x00', @ifru_hwaddr=@random}) 21:09:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmmsg(r0, &(0x7f0000008000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:09:05 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:09:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454ca, 0x0) 21:09:05 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, 0x0) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) [ 1679.709548][T28293] device bond143 entered promiscuous mode [ 1679.721675][T28293] 8021q: adding VLAN 0 to HW filter on device bond143 21:09:06 executing program 1: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x38, r0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x38}}, 0x0) 21:09:06 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x0) 21:09:06 executing program 5: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x8, 0x0, &(0x7f0000000240)) 21:09:06 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f8, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x260, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f8}}, 0x0) 21:09:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x580}]}) 21:09:06 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, 0x0) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:06 executing program 5: socket(0x2, 0x1, 0x14) 21:09:06 executing program 2: socket(0x26, 0x5, 0x0) 21:09:06 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, 0x0) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:06 executing program 3: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x89b1, &(0x7f0000000000)={'bridge0\x00'}) [ 1680.347331][T28342] device bond144 entered promiscuous mode 21:09:06 executing program 2: r0 = socket(0x29, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x4, 0x0, 0x0) [ 1680.396131][T28342] 8021q: adding VLAN 0 to HW filter on device bond144 21:09:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x4b564d05}]}) 21:09:06 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x98, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x98}}, 0x0) 21:09:06 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:06 executing program 5: r0 = socket(0x2, 0x3, 0xff) ioctl$SIOCAX25ADDUID(r0, 0x89e1, 0x0) 21:09:06 executing program 3: r0 = socket(0x1e, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x89e0, &(0x7f0000000080)={'macvlan1\x00', @ifru_hwaddr=@random}) 21:09:06 executing program 2: shmat(0x0, &(0x7f0000000000/0x14000)=nil, 0x7000) r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000100)) 21:09:07 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) [ 1680.792402][T28403] device bond145 entered promiscuous mode [ 1680.801725][T28403] 8021q: adding VLAN 0 to HW filter on device bond145 21:09:07 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xb702, 0x0) 21:09:07 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000080)) 21:09:07 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x98, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x98}}, 0x0) 21:09:07 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)) io_submit(0x0, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, 0x0]) 21:09:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000002100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x2, &(0x7f0000000180)="59b1"}) 21:09:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0xc008ae88, &(0x7f0000000000)) 21:09:07 executing program 3: r0 = socket(0x2a, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}}, 0x4000) 21:09:07 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x5, 0x4, 0x24, 0x4}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x5, 0x4, 0x24, 0x4}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x7, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0x86, &(0x7f0000000140)=""/134, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1681.225841][T28460] device bond146 entered promiscuous mode 21:09:07 executing program 5: socketpair(0x1d, 0x0, 0x7, &(0x7f0000000180)) [ 1681.330786][T28460] 8021q: adding VLAN 0 to HW filter on device bond146 21:09:07 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x0, 0x0) 21:09:07 executing program 2: syz_mount_image$affs(&(0x7f0000000080)='affs\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)) 21:09:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000440)={0x2, 'vlan0\x00', {0x3}}) 21:09:07 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x98, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x98}}, 0x0) 21:09:07 executing program 1: r0 = socket(0x18, 0x0, 0x1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x29, 0x6, 0x9, 0x2, 0x68, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, 0x8, 0x1, 0x101, 0x7fff}}) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket(0x200000000000011, 0x3, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket(0x200000000000011, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x144, 0x10, 0x713, 0x0, 0x0, {{@in=@local, @in6=@mcast2}, {@in=@multicast1, 0x0, 0x32}, @in6=@private1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @offload={0xc, 0x1c, {r7}}]}, 0x144}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'syztnl0\x00', &(0x7f00000001c0)={'ip_vti0\x00', r7, 0x10, 0x7, 0x52d, 0xe607, {{0x22, 0x4, 0x0, 0x3d, 0x88, 0x66, 0x0, 0x40, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xa}, @private=0xa010100, {[@timestamp={0x44, 0x18, 0x94, 0x0, 0xa, [0x1, 0xfff, 0x2, 0x7fff, 0x800]}, @timestamp_prespec={0x44, 0x2c, 0x51, 0x3, 0x9, [{@local, 0x99023ff}, {@loopback, 0x4}, {@multicast1, 0x1}, {@loopback, 0x8001}, {@multicast1, 0x200}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x5b, 0x3, 0xe, [{@multicast2, 0x8b10}, {@multicast1, 0xffffffbe}]}, @end, @timestamp_prespec={0x44, 0x14, 0xbb, 0x3, 0x6, [{@dev={0xac, 0x14, 0x14, 0x13}, 0x8}, {@empty, 0xffff}]}]}}}}}) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r2, &(0x7f0000000080)={0x11, 0x0, r9}, 0x14) getsockname$packet(r2, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="44010000100013070000000000000000ac1414aa000000000000000000000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="e00000010000000000000000000000000000000032000000fc010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001c00", @ANYRES32=r10, @ANYBLOB="00e900c4"], 0x144}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8912, &(0x7f00000000c0)={'wg0\x00', r10}) 21:09:07 executing program 5: syz_open_dev$rtc(&(0x7f0000005fc0)='/dev/rtc#\x00', 0xffffffffffffffff, 0x0) 21:09:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4008ae48, 0x0) 21:09:07 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x0, 0x0) 21:09:07 executing program 2: r0 = socket(0x2a, 0x2, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000000080)) [ 1681.778836][T28515] device bond147 entered promiscuous mode [ 1681.798397][T28515] 8021q: adding VLAN 0 to HW filter on device bond147 21:09:08 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2e0, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x248, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}]}]}, 0x2e0}}, 0x0) 21:09:08 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x11, 0x65, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) 21:09:08 executing program 3: r0 = socket(0xa, 0x6, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x10d, 0x7, 0x0, 0x0) 21:09:08 executing program 2: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) 21:09:08 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x0, 0x0) 21:09:08 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454ca, 0x401006) ioctl$TUNSETVNETHDRSZ(r0, 0x800454d3, &(0x7f0000000000)) [ 1682.248097][T28578] device bond148 entered promiscuous mode [ 1682.256165][T28578] 8021q: adding VLAN 0 to HW filter on device bond148 21:09:08 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2e0, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x248, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}]}]}, 0x2e0}}, 0x0) 21:09:08 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000009fc0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) 21:09:08 executing program 2: r0 = socket(0xa, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 21:09:08 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 21:09:08 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000009780)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000005440)={0x2020}, 0x2020) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000023c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f00000021c0)={0x28, 0x0, r2}, 0x28) 21:09:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x277}]}) 21:09:08 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0x8953, 0x0) [ 1682.539513][T28629] device bond149 entered promiscuous mode [ 1682.547505][T28629] 8021q: adding VLAN 0 to HW filter on device bond149 21:09:08 executing program 2: r0 = socket(0x11, 0x803, 0x0) sendmsg$rds(r0, &(0x7f0000000480)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) 21:09:08 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2e0, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x248, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}]}]}, 0x2e0}}, 0x0) 21:09:08 executing program 5: r0 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) write$6lowpan_enable(r0, &(0x7f0000000100)='0', 0xffffffffffffff3c) 21:09:09 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x0, &(0x7f0000000480)) 21:09:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x3b}]}) 21:09:09 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2e4, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x24c, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x4}]}]}, 0x2e4}}, 0x0) [ 1682.921681][T28682] device bond150 entered promiscuous mode [ 1682.928840][T28682] 8021q: adding VLAN 0 to HW filter on device bond150 21:09:09 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000040)) 21:09:09 executing program 3: socket(0x10, 0x2, 0x0) 21:09:09 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x37c, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0x40045731, &(0x7f0000000040)) [ 1683.071036][T28727] device bond151 entered promiscuous mode [ 1683.077456][T28727] 8021q: adding VLAN 0 to HW filter on device bond151 21:09:09 executing program 3: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8931, &(0x7f0000000000)={'vlan1\x00'}) 21:09:09 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000002580)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000025c0)={0x0, 0x0, 0x0, {0xb, @pix_mp}}) 21:09:09 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x0, &(0x7f0000000480)) 21:09:09 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2e4, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x24c, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x4}]}]}, 0x2e4}}, 0x0) 21:09:09 executing program 2: r0 = socket(0x15, 0x5, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xf) 21:09:09 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x890c, 0x0) 21:09:09 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0x890b, 0x0) 21:09:09 executing program 5: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8931, &(0x7f0000000140)={'team_slave_1\x00'}) 21:09:09 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) bind$isdn(r0, 0x0, 0x0) 21:09:09 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x0, &(0x7f0000000480)) [ 1683.669607][T28780] device bond152 entered promiscuous mode 21:09:09 executing program 2: r0 = getpid() pidfd_open(r0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x9}, 0x0, 0x0) 21:09:09 executing program 1: r0 = socket(0xa, 0x1, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x40000000000000}}, 0x0) 21:09:09 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x1a, 0x0, &(0x7f0000000180)) [ 1683.739514][T28780] 8021q: adding VLAN 0 to HW filter on device bond152 21:09:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "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", [[], [], [], [], [], [], [], []]}, 0xec1) 21:09:10 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2e4, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x24c, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x4}]}]}, 0x2e4}}, 0x0) 21:09:10 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[0x0]) 21:09:10 executing program 5: r0 = socket(0x11, 0xa, 0x0) bind$unix(r0, 0x0, 0x0) 21:09:10 executing program 2: socket$rds(0x15, 0x5, 0x0) select(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f00000001c0)) 21:09:10 executing program 1: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) 21:09:10 executing program 3: socket(0x2, 0x3, 0x2) 21:09:10 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000040)={'bond_slave_1\x00', @ifru_data=0x0}) 21:09:10 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[0x0]) 21:09:10 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x4, 0x2, 0x80000000}, 0x40) 21:09:10 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl$SIOCPNDELRESOURCE(r0, 0xc020660b, 0x0) 21:09:10 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8921, &(0x7f0000000080)={'veth0\x00', @ifru_hwaddr=@remote}) [ 1684.275763][T28840] device bond153 entered promiscuous mode 21:09:10 executing program 2: r0 = socket(0xa, 0x3, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0xd, 0x0, 0x0) [ 1684.335071][T28840] 8021q: adding VLAN 0 to HW filter on device bond153 21:09:10 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2d8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x240, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2d8}}, 0x0) 21:09:10 executing program 1: r0 = socket(0x2, 0x3, 0x4) ioctl$sock_ifreq(r0, 0x89e0, 0x0) 21:09:10 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x541b, 0x0) 21:09:10 executing program 3: r0 = socket(0x23, 0x2, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) 21:09:10 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[0x0]) 21:09:10 executing program 2: openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x142, 0x0, 0x11}, 0x18) 21:09:10 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000002580)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc0285629, &(0x7f00000025c0)={0x0, 0x0, 0x0, {0x0, @pix_mp}}) 21:09:10 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2d8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x240, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2d8}}, 0x0) [ 1684.729041][T28900] device bond154 entered promiscuous mode [ 1684.737548][T28900] 8021q: adding VLAN 0 to HW filter on device bond154 21:09:10 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x17, 0x0, &(0x7f0000000180)) 21:09:11 executing program 2: r0 = socket(0xa, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) 21:09:11 executing program 3: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x6, 0x0, &(0x7f0000000080)) [ 1684.913566][T28944] device bond155 entered promiscuous mode 21:09:11 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 21:09:11 executing program 2: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x75, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0x10) [ 1684.990388][T28944] 8021q: adding VLAN 0 to HW filter on device bond155 21:09:11 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x8980, &(0x7f0000000040)) 21:09:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) 21:09:11 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0x5460, 0x0) 21:09:11 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2d8, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x240, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2d8}}, 0x0) 21:09:11 executing program 2: io_setup(0x400, &(0x7f0000000080)=0x0) r1 = socket$rds(0x15, 0x5, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0xfe, 0x0, 0x0, r2, 0x0}]) 21:09:11 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 21:09:11 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8927, &(0x7f0000000000)={'ip_vti0\x00'}) 21:09:11 executing program 5: r0 = socket(0x2, 0x6, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) 21:09:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() mmap$IORING_OFF_CQ_RING(&(0x7f00003fe000/0xc00000)=nil, 0xc00000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) 21:09:11 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000004080)={0x0, 0x7, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "88e05c6d"}}) 21:09:11 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 21:09:11 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 1685.723556][T29003] device bond156 entered promiscuous mode [ 1685.729671][T29003] 8021q: adding VLAN 0 to HW filter on device bond156 21:09:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x28, r1, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x25, @ipv4={[], [], @empty}}]}, 0x28}}, 0x0) 21:09:12 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f0, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x258, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f0}}, 0x0) 21:09:12 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000008300)='/dev/vcsa#\x00', 0x2, 0x640002) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) 21:09:12 executing program 1: socket(0x23, 0x5, 0x0) fanotify_init(0x0, 0x0) socket(0x23, 0x5, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x61}, &(0x7f0000000100)={0x0, 0x989680}, 0x0) 21:09:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x20b}]}) 21:09:12 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) [ 1686.118527][T29064] device bond157 entered promiscuous mode [ 1686.126596][T29064] 8021q: adding VLAN 0 to HW filter on device bond157 21:09:12 executing program 3: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x7d, 0x0, &(0x7f0000000240)) 21:09:12 executing program 5: r0 = socket(0xa, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x1d, 0x0, &(0x7f0000000180)) 21:09:12 executing program 1: r0 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$sock(r0, &(0x7f0000000280)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x11}, 0x80, 0x0}, 0x0) 21:09:12 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f0, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x258, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f0}}, 0x0) 21:09:12 executing program 2: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ocfs2_control\x00', 0x0, 0x0) read$qrtrtun(r0, &(0x7f0000000a40)=""/109, 0x6d) 21:09:12 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 21:09:12 executing program 3: r0 = socket(0x18, 0x0, 0x2) connect$can_j1939(r0, 0x0, 0x0) 21:09:12 executing program 3: io_setup(0x400, &(0x7f0000000080)=0x0) r1 = socket$rds(0x15, 0x5, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) io_submit(r0, 0x2, &(0x7f0000000280)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) 21:09:12 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x401, 0x0) read$FUSE(r0, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_rr_get_interval(r1, 0x0) 21:09:12 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x80108906, 0x0) 21:09:12 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) io_submit(r0, 0x1, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) [ 1686.709572][T29121] device bond158 entered promiscuous mode [ 1686.733508][T29121] 8021q: adding VLAN 0 to HW filter on device bond158 21:09:13 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:09:13 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2f0, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x258, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2f0}}, 0x0) 21:09:13 executing program 2: r0 = socket(0x2, 0x3, 0xff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000140)={0x0}}, 0x0) 21:09:13 executing program 3: r0 = socket(0x2, 0x3, 0x1) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:13 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x29, &(0x7f0000000000), 0x10) 21:09:13 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x23, 0x0, 0x0) 21:09:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="110300000000000000000200000018000380"], 0x2c}}, 0x0) 21:09:13 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r0, 0x11, 0x2, 0x0, 0x0) 21:09:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x500, 0x0, [{}]}) [ 1687.202087][T29179] device bond159 entered promiscuous mode [ 1687.235718][T29179] 8021q: adding VLAN 0 to HW filter on device bond159 21:09:13 executing program 5: r0 = socket(0x2, 0xa, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, 0x0, 0x0) 21:09:13 executing program 1: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000001700)) 21:09:13 executing program 2: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:13 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x84fb, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f00000019c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 21:09:13 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2e4, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x24c, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2e4}}, 0x0) 21:09:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffcbd, &(0x7f00000000c0)={&(0x7f0000000080)={0x15, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}, {0x14}}}, 0x30}}, 0x0) 21:09:13 executing program 1: r0 = socket(0xa, 0x6, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)={0x228, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}]}, 0x228}}, 0x0) 21:09:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 21:09:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x7ff}) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0xfffffffffffffe02, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) 21:09:13 executing program 4: r0 = syz_io_uring_setup(0x3c91, &(0x7f0000000000), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000080)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000000), 0x1) 21:09:13 executing program 3: r0 = socket(0x1, 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0xf0ff7f) [ 1687.740575][T29246] device bond160 entered promiscuous mode [ 1687.767478][T29246] 8021q: adding VLAN 0 to HW filter on device bond160 21:09:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)={[{@fat=@debug='debug'}]}) 21:09:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x12}]}) 21:09:14 executing program 5: r0 = socket(0x28, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) 21:09:14 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2e4, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x24c, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2e4}}, 0x0) 21:09:14 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x84fb, &(0x7f0000000100)=0x0) socket$rds(0x15, 0x5, 0x0) io_submit(r1, 0x1, &(0x7f00000019c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 21:09:14 executing program 2: io_setup(0x5, &(0x7f00000002c0)) io_setup(0x0, &(0x7f00000002c0)) 21:09:14 executing program 5: r0 = socket(0xa, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x541b, 0x0) 21:09:14 executing program 4: r0 = socket(0xa, 0x6, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, 0x0, 0x0) 21:09:14 executing program 1: r0 = socket(0x2, 0x1, 0x0) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={0x0}}, 0x24008090) 21:09:14 executing program 4: socket$inet6(0xa, 0x6, 0x0) 21:09:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x5, 0x4, 0x24, 0x4}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=@framed={{}, [@alu={0x4, 0x0, 0xd, 0x0, 0x0, 0x47}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1688.237395][T29313] device bond161 entered promiscuous mode 21:09:14 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x890b, &(0x7f0000003900)={'batadv0\x00'}) [ 1688.285153][T29313] 8021q: adding VLAN 0 to HW filter on device bond161 21:09:14 executing program 2: io_setup(0x400, &(0x7f0000000080)=0x0) r1 = syz_io_uring_setup(0x57ca, &(0x7f0000000000), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 21:09:14 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x21, &(0x7f0000000000), 0x10) 21:09:14 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2e4, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x24c, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2e4}}, 0x0) 21:09:14 executing program 3: r0 = socket(0x10, 0x2, 0x0) bind$netrom(r0, &(0x7f00000000c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) 21:09:14 executing program 5: r0 = socket(0xa, 0x6, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x5, 0x0, 0x0) 21:09:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={0x0}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3400000010008105000000000016000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012800b000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@RTM_NEWMDB={0x38, 0x54, 0x5, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20}]}, 0x38}}, 0x0) 21:09:14 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) 21:09:14 executing program 5: r0 = socket(0x2, 0x1, 0x0) accept4$x25(r0, 0x0, 0x0, 0x0) [ 1688.571430][T29378] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:09:14 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x13, &(0x7f0000000000), 0x10) 21:09:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454ca, 0x401006) ioctl$TUNSETVNETHDRSZ(r0, 0x800454dd, &(0x7f0000000000)) 21:09:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0xc051) 21:09:14 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x21}) [ 1688.755834][T29379] device bond162 entered promiscuous mode 21:09:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x8010aebc, 0x0) [ 1688.816661][T29379] 8021q: adding VLAN 0 to HW filter on device bond162 [ 1688.875560][T29387] PF_BRIDGE: br_mdb_parse() with invalid entry [ 1688.888478][T29387] PF_BRIDGE: br_mdb_parse() with invalid entry 21:09:15 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2d4, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x23c, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2d4}}, 0x0) 21:09:15 executing program 3: r0 = socket(0x2, 0x3, 0xff) bind$rds(r0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr=0x64010101}, 0x10) 21:09:15 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/user\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) 21:09:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x127f, 0xffffffffffffffff) 21:09:15 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x88, 0x64, &(0x7f0000000000)={0x3}, 0x10) 21:09:15 executing program 4: socket(0x2, 0x1, 0x106) 21:09:15 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x1000078) 21:09:15 executing program 2: r0 = socket(0x26, 0x5, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x0) 21:09:15 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000000)={{}, 'port1\x00'}) 21:09:15 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000002580)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000025c0)={0x0, 0x0, 0x0, {0xd, @pix_mp}}) 21:09:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90b, 0x1) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x5522, 0x0) [ 1689.333961][T29454] device bond163 entered promiscuous mode 21:09:15 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(0x0) [ 1689.386850][T29454] 8021q: adding VLAN 0 to HW filter on device bond163 21:09:15 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2d4, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x23c, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2d4}}, 0x0) 21:09:15 executing program 3: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00'}) 21:09:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$rds(r0, &(0x7f0000001b80)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000019c0)=[@rdma_map={0x30, 0x114, 0x3, {{0x0}, 0x0}}, @mask_fadd={0x58, 0x114, 0x8, {{}, 0x0, 0x0}}], 0x88}, 0x0) 21:09:15 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000100)) 21:09:15 executing program 1: socket(0x23, 0x5, 0x0) socket(0x23, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x7005, 0x0) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x61}, &(0x7f0000000100)={0x0, 0x989680}, 0x0) 21:09:15 executing program 5: r0 = socket(0x28, 0x1, 0x0) accept4$bt_l2cap(r0, 0x0, 0x0, 0x0) 21:09:15 executing program 4: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @loopback}]}, &(0x7f0000000240)=0x10) 21:09:15 executing program 2: r0 = socket(0xa, 0x5, 0x0) connect$netrom(r0, 0x0, 0x1a) 21:09:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x7}, 0x31, &(0x7f0000000180)={0x0}}, 0x1c) 21:09:16 executing program 5: r0 = socket(0x11, 0x2, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)={{0x3, @bcast}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x20001048) [ 1689.850947][T29513] device bond164 entered promiscuous mode 21:09:16 executing program 1: socket(0x23, 0x5, 0x0) socket(0x23, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x7005, 0x0) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x61}, &(0x7f0000000100)={0x0, 0x989680}, 0x0) [ 1689.894367][T29513] 8021q: adding VLAN 0 to HW filter on device bond164 21:09:16 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, r0, 0x3b1cb05ac6ec674f}, 0x14}}, 0x0) 21:09:16 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2d4, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x23c, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2d4}}, 0x0) 21:09:16 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x40081271, r0) 21:09:16 executing program 2: r0 = socket(0xa, 0x6, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 21:09:16 executing program 1: r0 = socket(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x11, 0x0, &(0x7f0000000240)) 21:09:16 executing program 3: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x89a1, &(0x7f0000000000)={'ip_vti0\x00'}) 21:09:16 executing program 5: mmap$fb(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 1690.349391][T29576] device bond165 entered promiscuous mode [ 1690.415552][T29576] 8021q: adding VLAN 0 to HW filter on device bond165 21:09:16 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockname$packet(r0, 0x0, 0x0) 21:09:16 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000001c0)={@my=0x1}) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000003c0)={@my=0x0}) 21:09:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x400000b0}]}) 21:09:16 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="f8000000", @ANYRES16=r1, @ANYBLOB="01002cbd7000fddbdf25250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32, @ANYBLOB="0800010070636900", @ANYRES32, @ANYBLOB="080001"], 0xf8}}, 0x0) 21:09:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x12}]}) 21:09:16 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2e4, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x24c, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x10, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2e4}}, 0x0) [ 1690.806838][T29625] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.3'. 21:09:17 executing program 3: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) 21:09:17 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@multicast, @remote, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x5, 0x0, @dev, "844c96309a", @empty, "790bf5"}}}}, 0x0) 21:09:17 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ifreq(r0, 0x5411, 0x0) [ 1691.002854][T29626] device bond166 entered promiscuous mode 21:09:17 executing program 2: syz_mount_image$affs(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:09:17 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/mnt\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0xb701, 0x0) [ 1691.057479][T29626] 8021q: adding VLAN 0 to HW filter on device bond166 21:09:17 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2e4, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x24c, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x10, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2e4}}, 0x0) 21:09:17 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x53, &(0x7f0000001280)=""/4096, &(0x7f0000000040)=0x20002280) 21:09:17 executing program 1: r0 = socket(0x2, 0x6, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) 21:09:17 executing program 3: r0 = socket(0x15, 0x5, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0xfffffffffffffffe}}, 0x0) 21:09:17 executing program 2: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x400) 21:09:17 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x0, 0x0) io_setup(0x6, &(0x7f0000000080)=0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) io_submit(r1, 0x2, &(0x7f0000000480)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 21:09:17 executing program 3: r0 = socket(0xa, 0x2, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x65, 0x0, &(0x7f0000000200)) [ 1691.528676][T29695] device bond167 entered promiscuous mode 21:09:17 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) connect$rds(r0, &(0x7f0000000240)={0x2, 0x0, @multicast2}, 0x10) 21:09:17 executing program 1: r0 = fsopen(&(0x7f0000000000)='rpc_pipefs\x00', 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x70, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000080)='((\\%\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c) [ 1691.586732][T29695] 8021q: adding VLAN 0 to HW filter on device bond167 21:09:17 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x8937, &(0x7f0000000000)={'ip_vti0\x00'}) 21:09:17 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2e4, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x24c, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x10, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2e4}}, 0x0) 21:09:17 executing program 3: r0 = socket(0x2b, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000024c0), 0x8) 21:09:18 executing program 1: r0 = socket(0xa, 0x3, 0x1) bind$netrom(r0, &(0x7f0000000000)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) [ 1691.960913][T29753] device bond168 entered promiscuous mode [ 1691.975070][T29753] 8021q: adding VLAN 0 to HW filter on device bond168 21:09:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@getrule={0x14, 0x22, 0x1}, 0x14}}, 0x0) 21:09:20 executing program 2: r0 = socket(0x2, 0x3, 0x3b) bind$packet(r0, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xf) 21:09:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xffffffffffffffe9, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) 21:09:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 21:09:20 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d00000004000073564d38840300001e000000000000000010cc03020001005265497345723346730000000200000002", 0x45, 0x10000}, {&(0x7f0000000040)="0000020000000000000000001200000000000000843d00000004000073564d388403", 0x22, 0x3d96000}, {&(0x7f0000011300)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f", 0x46, 0x3d97000}, {&(0x7f0000011400)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x3d97fa0}], 0x1, &(0x7f0000000380)=ANY=[]) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) 21:09:20 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x29, 0xac0e6a4dcd5fba4c, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x400, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="2f13c285a23264d068e975e3390bf809d4e10e0000", 0x15}], 0x1, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @private}}}], 0x20}, 0x4080) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) bind$l2tp6(r2, &(0x7f0000000080)={0xa, 0x0, 0xe40, @loopback, 0x7, 0x4}, 0x20) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='freezer.self_freezing\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r5, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x4dc}}, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc020662a, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600000000723094eb677539ed", @ANYRES32=r6, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b0388500000000008f000000111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x2ec, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@IFLA_LINKINFO={0x70, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x60, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e21}, @IFLA_IPTUN_PROTO={0x5}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e23}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x36}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x3}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x8000014}]}}}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_VF_PORTS={0x254, 0x18, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x16}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4e7a3daebc790fc162a9fae6bfb16a86"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "8e593f3a0b18a93494b8f4ee37451306"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "512eb9d332f6dcc72f60cfd04eb3aea3"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xe}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d941af26316acf8f4d39352c79126414"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "30a0ba1e792618be2f8f9a7597c4a97c"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_PROFILE={0xa, 0x2, '!:,--\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x5}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "65b0d5f807ca6ef1cffbfa05cbda0682"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "be824e1a55cd8c9d685c1f8c89149e21"}]}, {0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xb, 0x2, 'ip6tnl\x00'}, @IFLA_PORT_PROFILE={0x9, 0x2, '])*)\x00'}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xeb$[*+\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d1d8837b43f9781743f803fbde3508fa"}]}, {0x5c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a04eef92d87f56406940ff64002d18be"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "73ab384b4d3c5c9daeb2da7b362b35b9"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "40f79eaa14bcce801af3d425c73e62b5"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x70}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0e00d903ca75eaf50fbbf51e8c7bb408"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f4379afaf3e8aee2bad43f0a43752bc4"}, @IFLA_PORT_PROFILE={0xa, 0x2, '\xb1!&*-\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_VF={0x8, 0x1, 0xfab}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "790147ec813a63261748aac066e2c57a"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "89d4366bb66c3cd74e0c7d65aa17e01a"}, @IFLA_PORT_PROFILE={0x7, 0x2, '$\'\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "c6b6381235ea35b246e7865b66560fec"}]}]}]}, 0x2ec}}, 0x0) 21:09:20 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)={0x24, 0x14, 0x759, 0x0, 0x0, {0x2c}, [@INET_DIAG_REQ_BYTECODE={0xd, 0x1, "8194665512815a1bab"}]}, 0x24}}, 0x0) [ 1694.669840][T29807] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1694.670100][T29802] REISERFS (device loop1): found reiserfs format "3.5" with non-standard journal [ 1694.690567][T29802] REISERFS (device loop1): using ordered data mode [ 1694.707422][T29802] reiserfs: using flush barriers 21:09:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000440)={0x2, 'vlan0\x00'}) [ 1694.772407][T29802] REISERFS (device loop1): journal params: device loop1, size 15748, journal first block 18, max trans len 1024, max batch 900, max commit age 0, max trans age 30 [ 1694.794716][T29802] REISERFS (device loop1): checking transaction log (loop1) [ 1694.808093][T29802] REISERFS (device loop1): Using rupasov hash to sort names 21:09:21 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x7, &(0x7f0000000740)={@broadcast}, 0xc) [ 1694.819476][T29802] REISERFS (device loop1): using 3.5.x disk format 21:09:21 executing program 5: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', &(0x7f0000000300), 0x18) syz_mount_image$jffs2(&(0x7f0000000340)='jffs2\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 21:09:21 executing program 4: r0 = socket(0x2, 0x3, 0x4) ioctl$sock_ifreq(r0, 0x541b, 0x0) 21:09:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 1694.980537][T29805] device bond169 entered promiscuous mode [ 1694.994428][T29802] reiserfs: enabling write barrier flush mode [ 1695.021628][T29805] 8021q: adding VLAN 0 to HW filter on device bond169 [ 1695.078939][T29802] ------------[ cut here ]------------ [ 1695.085559][T29802] WARNING: CPU: 1 PID: 29802 at fs/inode.c:996 unlock_new_inode+0x237/0x290 [ 1695.094367][T29802] Kernel panic - not syncing: panic_on_warn set ... [ 1695.100969][T29802] CPU: 1 PID: 29802 Comm: syz-executor.1 Not tainted 5.9.0-rc7-syzkaller #0 [ 1695.109668][T29802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1695.113942][T29869] No source specified [ 1695.120824][T29802] Call Trace: [ 1695.128189][T29802] dump_stack+0x198/0x1fd [ 1695.132544][T29802] panic+0x382/0x7fb [ 1695.136470][T29802] ? __warn_printk+0xf3/0xf3 [ 1695.141075][T29802] ? printk+0xba/0xed [ 1695.145067][T29802] ? log_store.cold+0x16/0x16 [ 1695.149750][T29802] ? __warn.cold+0x5/0x4b [ 1695.154100][T29802] ? unlock_new_inode+0x237/0x290 [ 1695.159257][T29802] __warn.cold+0x20/0x4b [ 1695.163512][T29802] ? unlock_new_inode+0x237/0x290 [ 1695.168549][T29802] report_bug+0x1bd/0x210 [ 1695.172945][T29802] handle_bug+0x38/0x90 [ 1695.173131][T29869] No source specified [ 1695.177137][T29802] ? ktime_get_coarse_real_ts64+0x7c/0xb0 [ 1695.177154][T29802] exc_invalid_op+0x14/0x40 [ 1695.177216][T29802] asm_exc_invalid_op+0x12/0x20 [ 1695.177238][T29802] RIP: 0010:unlock_new_inode+0x237/0x290 [ 1695.202833][T29802] Code: 44 0f bf 83 72 01 00 00 48 8d 95 c8 00 00 00 31 c9 4c 89 e7 48 c7 c6 80 b0 97 88 e8 13 27 93 ff e9 22 fe ff ff e8 29 3a ad ff <0f> 0b e9 6d fe ff ff 48 89 df e8 1a 10 ee ff e9 ea fd ff ff 4c 89 [ 1695.222481][T29802] RSP: 0018:ffffc900016bf6c0 EFLAGS: 00010246 21:09:21 executing program 5: r0 = socket(0x10, 0x2, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x10e, 0xb, 0x0, 0x0) [ 1695.228558][T29802] RAX: 0000000000040000 RBX: ffff888040a8c1d0 RCX: ffffc9000f044000 [ 1695.236539][T29802] RDX: 0000000000040000 RSI: ffffffff81c90467 RDI: 0000000000000007 [ 1695.244559][T29802] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000003 [ 1695.252538][T29802] R10: 0000000000000000 R11: 000000000019ddc8 R12: ffff888040a8c2a8 [ 1695.260544][T29802] R13: ffff888040a8c258 R14: 0000000000000000 R15: 00000000fffffff4 [ 1695.268557][T29802] ? unlock_new_inode+0x237/0x290 [ 1695.273609][T29802] reiserfs_new_inode+0x3b8/0x2130 [ 1695.278742][T29802] ? do_journal_begin_r+0x8a4/0x10d0 [ 1695.284050][T29802] ? reiserfs_fh_to_parent+0x1b0/0x1b0 [ 1695.289525][T29802] ? mutex_lock_io_nested+0xf60/0xf60 [ 1695.294916][T29802] ? mutex_lock_io_nested+0xf60/0xf60 [ 1695.300317][T29802] ? __mutex_unlock_slowpath+0xe2/0x610 [ 1695.305877][T29802] ? wait_for_completion+0x260/0x260 [ 1695.311174][T29802] ? wait_for_completion+0x260/0x260 [ 1695.316504][T29802] ? do_journal_begin_r+0xd2e/0x10d0 [ 1695.321903][T29802] ? security_old_inode_init_security+0xf4/0x130 21:09:21 executing program 5: syz_open_dev$vcsa(&(0x7f0000003640)='/dev/vcsa#\x00', 0x0, 0x0) [ 1695.328370][T29802] reiserfs_mkdir+0x4ad/0x980 [ 1695.333061][T29802] ? reiserfs_mknod+0x700/0x700 [ 1695.337939][T29802] ? down_write_killable+0x170/0x170 [ 1695.343236][T29802] ? wait_for_completion+0x260/0x260 [ 1695.348561][T29802] reiserfs_xattr_init+0x4de/0xb52 [ 1695.353685][T29802] reiserfs_remount+0xb97/0x1580 [ 1695.358632][T29802] ? finish_unfinished.isra.0+0x11f0/0x11f0 [ 1695.364532][T29802] ? do_raw_spin_unlock+0x171/0x230 [ 1695.369740][T29802] ? _raw_spin_unlock+0x24/0x40 [ 1695.374593][T29802] ? shrink_dentry_list+0x16/0x480 [ 1695.379805][T29802] ? _find_next_bit.constprop.0+0x1a3/0x200 [ 1695.385711][T29802] ? shrink_dcache_sb+0x1d5/0x220 [ 1695.390742][T29802] ? shrink_dentry_list+0x480/0x480 [ 1695.395953][T29802] ? finish_unfinished.isra.0+0x11f0/0x11f0 [ 1695.401855][T29802] legacy_reconfigure+0x115/0x180 [ 1695.406890][T29802] reconfigure_super+0x408/0x8d0 [ 1695.411838][T29802] ? fs_umode_to_dtype+0xd0/0xd0 [ 1695.416788][T29802] path_mount+0x1a4c/0x20a0 [ 1695.421311][T29802] ? strncpy_from_user+0x2bf/0x3e0 [ 1695.426430][T29802] ? copy_mount_string+0x40/0x40 21:09:21 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200000, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) [ 1695.431377][T29802] ? getname_flags.part.0+0x1dd/0x4f0 [ 1695.436768][T29802] __x64_sys_mount+0x27f/0x300 [ 1695.441539][T29802] ? copy_mnt_ns+0xa60/0xa60 [ 1695.446141][T29802] ? check_preemption_disabled+0x50/0x130 [ 1695.451874][T29802] ? syscall_enter_from_user_mode+0x1d/0x60 [ 1695.457783][T29802] do_syscall_64+0x2d/0x70 [ 1695.462206][T29802] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1695.468137][T29802] RIP: 0033:0x4607ea [ 1695.472061][T29802] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1695.491678][T29802] RSP: 002b:00007fa7a8e55a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1695.500102][T29802] RAX: ffffffffffffffda RBX: 00007fa7a8e55b20 RCX: 00000000004607ea [ 1695.508103][T29802] RDX: 0000000020000540 RSI: 0000000020000580 RDI: 0000000000000000 [ 1695.516082][T29802] RBP: 00007fa7a8e55ae0 R08: 00007fa7a8e55b20 R09: 0000000020000540 [ 1695.524065][T29802] R10: 0000000000240038 R11: 0000000000000202 R12: 0000000020000540 [ 1695.532043][T29802] R13: 0000000020000580 R14: 0000000000000000 R15: 0000000020001ec0 [ 1695.541954][T29802] Kernel Offset: disabled [ 1695.553152][T29802] Rebooting in 86400 seconds..