0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:09 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000001340)="4b769443c8b59070891cdd618f64c6", 0xf}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDGETKEYCODE(r4, 0x4b4c, &(0x7f0000000200)={0x3, 0x40}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@remote, @in6}}, {{@in6=@private0}, 0x0, @in6=@private0}}, &(0x7f0000000000)=0xe8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)) r5 = gettid() process_vm_writev(r5, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r6 = gettid() process_vm_writev(r6, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r7 = gettid() process_vm_writev(r7, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) getpgid(r7) 04:37:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r3, r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESHEX=r2, @ANYRESHEX=r0, @ANYRESDEC=r3, @ANYRES32=0x0, @ANYRESHEX=r0, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="6145c1b626f0b432398adfc228381947626c942a8c43b7aaf062fccbe06f95f3355052252c6c14f149f586832524579a7d8620430555fa90e4a88bcd63977ef998bbb67a815e6620522351bc46d429586440b63de3b5416579392047b10e0618b088755a9ebd3c81d31f26d0cc70907f9cbf7b251dfeaafb16d0bd16e84d3d249b", @ANYPTR, @ANYRESOCT, @ANYRES64=0x0, @ANYPTR64, @ANYRES32=r0, @ANYRESHEX=0x0, @ANYPTR64], @ANYRESHEX, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRES16]], @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000000000000000000000000040d94bfeadc028208f0dbb82852b42000000ea0000040000000000000000e1e8154f707c51bf00000000000000680200000000000000000000e6010000000100000000002000de9fdc624b5fe772e4f5fcde0b1b3c310cbf9e8fa5d6008000000000"], 0x4}}, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) r4 = socket$inet6(0xa, 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) chroot(&(0x7f0000000000)='./file0\x00') r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) ioctl$VIDIOC_REQBUFS(r6, 0xc0145608, &(0x7f00000000c0)={0x20, 0x3, 0x4}) sendmmsg(r4, &(0x7f000000ac80), 0x66, 0x0) 04:37:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 319.978743][T10698] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:09 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 320.149131][T10712] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:09 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r7, r7) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000080)={0xfffffffa, 0x1, 0x4, 0x40, 0x400, {r3, r4/1000+10000}, {0x7, 0xf, 0x21, 0x1, 0x80, 0x8, "dd78cf9f"}, 0x3, 0x1, @fd=r6, 0x3, 0x0, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x7ffffffd, @loopback}, {0x2, 0x0, 0xffffffff, @ipv4={[], [], @loopback}}, r9}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r8, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r9, 0x8f}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a8ffffffff00000004122e25d30806", 0x0, 0x403, 0x0, 0x22d}, 0x28) 04:37:10 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000002c0)={0xa20000, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)={0x0, 0x5, [], @value64=0xe0a8}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x7f58843fb415adbf, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000200)={0xc, 0x8, 0xfa00, {&(0x7f0000000300)}}, 0x10) r3 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r3, 0x8982, &(0x7f0000000080)={0x0, 'nr0\x00', {0x2}, 0xfc20}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303107004c494e55582020202020202020a7500a8ba9ec534b20202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0) 04:37:10 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r2, 0x0, 0x0) r3 = add_key(&(0x7f0000000200)='pkcs7_test\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="27ce84664e88bb9665f09275f2d56d2303e1f1136512cbef41b2eb27defe9acdd816287282be881e64527b117e6c184067413a793ab7d1253fd5221d0d7cd39e64ec70c85efa36827ec7539d32561bf1960d89a842a05bd94c3a4a9b2c", 0x5d, r2) r4 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r4, 0x0, 0x0) r5 = request_key(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000540)='!em0#eth1vboxnet0em1wlan1\x00', 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r3, r4, r5, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r8, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB='<\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r8, @ANYBLOB="0000000000000000f3ff00000b000100666c6f77657200000c00020006002b00000000001b0b099a5bd4e1d473e77eb4d50ae1621aeafb683cbcab1b49dfce807806ae32f729a85878a6ad870c59b8e6c92dfa3726f8719b70bc12378529399f1ea6b9b82d18d0c398316227a9daf774592de4b6ad2d62b53ec1803281e6c9f889ea0d483bef97c3a7d3180a8f7ed3009ecd8c530929e7fe7e2c1b385f4e1a307d19edbc47b315518dd3572776612bfce3be588fb4c66b7adc09c8e3a9ad2c3b6c6c2fc0933e38ae83ee8337d8c45c6a762adf4954b9199ba1"], 0x3c}}, 0x0) 04:37:10 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:10 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 320.794359][ T182] tipc: TX() has been purged, node left! 04:37:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0x1c) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b5d509b00000000003f000000000000000000000000000000000000000000000700000000000000000000000000000000000000000038006c000000000000000000000000063a00"/120], 0x320) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ubi_ctrl\x00', 0x80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ACQUIRE(r5, 0x6430) r6 = syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, r6, 0x0, 0x0, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x200020d0}, 0x40000) sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14, r6, 0x8, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x48404) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r9, 0xc05064a7, &(0x7f0000000380)={&(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0], 0x3, 0x3, 0x4, 0x0, 0x4c0}) ioctl$KVM_GET_PIT2(r7, 0x8070ae9f, &(0x7f00000000c0)) 04:37:10 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x3c, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0xffffffffa0020000, 0x0, 0x0, 0xb2) 04:37:10 executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) inotify_init() setxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0x8}, 0x2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x77, 0x4, 0x1f, "dfd3f3a81686b821ae66e8978c901552", "a338edf96e0667fb9e55e44ba4dab1254ec6862a1ce0f2e6a4ac22b6722efd9772b8a6aeb37c87e04832340526f3e9c5a066e7e346320fc7e75c7cbd4f3c543d4cbc4b6ba21ecabc78de6edca412796d03f59ef9a716182891a09817b5a36dc4e1fc"}, 0x77, 0x2) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) 04:37:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:10 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x4800, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c00000013001d0400000000000000006c0e003f", @ANYRES32=0x0, @ANYBLOB="000000000000000008000a0010000000140003006970766c616e31000000000000000000afeecb257b0dd0aa3150b7451921d49b73be7b80acd4fc2bacdc6f68eba3330627e92629ed6b0ffeeabf3edfa83e5dd0d209527102f38577d50a6e8baac3a7fd212218"], 0x3c}, 0x1, 0xf0}, 0x0) pipe(0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x3800}}, {@default_permissions='default_permissions'}], [{@audit='audit'}]}}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 04:37:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 321.203851][ T26] audit: type=1804 audit(1587789430.878:24): pid=10777 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir350077572/syzkaller.bDdGY9/62/bus" dev="sda1" ino=16112 res=1 04:37:11 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, 0x0) [ 321.338063][T10788] team0: Device ipvlan1 failed to register rx_handler [ 321.385025][ T26] audit: type=1804 audit(1587789431.068:25): pid=10790 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir350077572/syzkaller.bDdGY9/62/bus" dev="sda1" ino=16112 res=1 04:37:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 321.433979][ T26] audit: type=1800 audit(1587789431.068:26): pid=10790 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16112 res=0 04:37:11 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, 0x0) 04:37:11 executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) inotify_init() setxattr$security_ima(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0x8}, 0x2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x77, 0x4, 0x1f, "dfd3f3a81686b821ae66e8978c901552", "a338edf96e0667fb9e55e44ba4dab1254ec6862a1ce0f2e6a4ac22b6722efd9772b8a6aeb37c87e04832340526f3e9c5a066e7e346320fc7e75c7cbd4f3c543d4cbc4b6ba21ecabc78de6edca412796d03f59ef9a716182891a09817b5a36dc4e1fc"}, 0x77, 0x2) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) 04:37:11 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, 0x0) 04:37:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:11 executing program 4 (fault-call:9 fault-nth:0): clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 321.863875][ T26] audit: type=1804 audit(1587789431.538:27): pid=10811 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir350077572/syzkaller.bDdGY9/63/bus" dev="sda1" ino=16106 res=1 04:37:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 322.017432][T10815] FAULT_INJECTION: forcing a failure. [ 322.017432][T10815] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 322.079625][T10815] CPU: 1 PID: 10815 Comm: syz-executor.4 Not tainted 5.7.0-rc1-syzkaller #0 [ 322.088844][T10815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.098907][T10815] Call Trace: [ 322.102207][T10815] dump_stack+0x11d/0x187 [ 322.106550][T10815] should_fail.cold+0x5/0xf [ 322.111114][T10815] __alloc_pages_nodemask+0xcf/0x300 [ 322.116441][T10815] alloc_pages_current+0xca/0x170 [ 322.121479][T10815] pte_alloc_one+0x14/0x50 [ 322.125903][T10815] __handle_mm_fault+0x2a34/0x2ec0 [ 322.131037][T10815] handle_mm_fault+0x21c/0x540 [ 322.135911][T10815] do_page_fault+0x48a/0xa96 [ 322.140541][T10815] ? do_syscall_64+0x27f/0x3b0 [ 322.145338][T10815] page_fault+0x34/0x40 [ 322.149491][T10815] RIP: 0033:0x476405 [ 322.153399][T10815] Code: ff ff 44 89 8d 30 fb ff ff e8 27 f2 fb ff 44 8b 8d 30 fb ff ff 4c 8b 85 28 fb ff ff e9 72 ec ff ff 31 c0 48 83 c9 ff 4c 89 df ae c7 85 28 fb ff ff 00 00 00 00 48 89 c8 48 f7 d0 4c 8d 50 ff [ 322.173005][T10815] RSP: 002b:00007f3efe5be410 EFLAGS: 00010286 [ 322.179071][T10815] RAX: 0000000000000000 RBX: 00007f3efe5be970 RCX: ffffffffffffffff [ 322.187045][T10815] RDX: 0000000000000030 RSI: 00007f3efe5be928 RDI: 0000000020000040 [ 322.195012][T10815] RBP: 00007f3efe5be960 R08: 0000000000000000 R09: 000000000000000b [ 322.202995][T10815] R10: 0000000000000073 R11: 0000000020000040 R12: 00000000004c1781 [ 322.211001][T10815] R13: 00007f3efe5beae8 R14: 00000000004c178c R15: 0000000000000000 04:37:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x4800, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c00000013001d0400000000000000006c0e003f", @ANYRES32=0x0, @ANYBLOB="000000000000000008000a0010000000140003006970766c616e31000000000000000000afeecb257b0dd0aa3150b7451921d49b73be7b80acd4fc2bacdc6f68eba3330627e92629ed6b0ffeeabf3edfa83e5dd0d209527102f38577d50a6e8baac3a7fd212218"], 0x3c}, 0x1, 0xf0}, 0x0) pipe(0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800, &(0x7f0000000340)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x3800}}, {@default_permissions='default_permissions'}], [{@audit='audit'}]}}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 04:37:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getpeername$tipc(r2, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:12 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 322.462048][T10827] team0: Device ipvlan1 failed to register rx_handler 04:37:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f00000001c0)={0x7b}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0x434, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x41800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:37:12 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) socket$l2tp6(0xa, 0x2, 0x73) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 322.843592][T10840] kvm_hv_set_msr: 1 callbacks suppressed [ 322.843610][T10840] kvm [10839]: vcpu0, guest rIP: 0x13c Hyper-V unhandled wrmsr: 0x40000024 data 0x43400000006 [ 322.921648][T10840] kvm [10839]: vcpu0, guest rIP: 0x14c Hyper-V unhandled wrmsr: 0x4000002f data 0x43400000025 04:37:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:12 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x6, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x2, 0x4e20, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) fchmodat(r4, &(0x7f0000000080)='./file0\x00', 0x79) 04:37:12 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mount(0x0, 0x0, &(0x7f00000003c0)='nfsd\x00', 0x40006, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f00000000c0)=0x6e) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x8001) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@ipv4={[], [], @rand_addr=0x64010100}, 0x0, 0x3c}, 0x2, @in=@empty, 0x0, 0x4, 0x0, 0x3}}, 0xe8) sendmmsg(r2, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 04:37:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, &(0x7f00000000c0)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, &(0x7f00000000c0)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:13 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mount(0x0, 0x0, &(0x7f00000003c0)='nfsd\x00', 0x40006, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f00000000c0)=0x6e) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x8001) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@ipv4={[], [], @rand_addr=0x64010100}, 0x0, 0x3c}, 0x2, @in=@empty, 0x0, 0x4, 0x0, 0x3}}, 0xe8) sendmmsg(r2, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 04:37:13 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setsockopt$IPT_SO_SET_REPLACE(r2, 0x9003000000000000, 0x40, &(0x7f0000000a40)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c8020000010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000001800000000000000000000000023000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e0300000000000000000000000000000000000000000000000000000000000003fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff3396fc604b517c74af8d9742710b4b6559827a39c7fd04be6cb759790e1dfd6786127837", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESOCT=r1, @ANYRES16=r4, @ANYRES16], @ANYRESOCT=r6, @ANYBLOB="b71f2664a3f60dbe891f0714065c04db9efb2c4e39f8d3f8c4bcf8948b99dc2493a787d179df34aac3606846c83f21163e174003c22be18667132672faa9aa", @ANYRESOCT], 0x5) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$tipc(r1, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:13 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000080)=0x3ff, 0x4) 04:37:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_init_net_socket$rose(0xb, 0x5, 0x0) 04:37:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$tipc(r1, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 324.151211][T10899] rpfilter_check: 11 callbacks suppressed [ 324.151220][T10899] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$tipc(r1, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev, [], 0x0, 0x0, 0x0, 0x0, 0xa78}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:14 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x20, r5, 0xb03, 0x0, 0x0, {0x13}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x4}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa8, r5, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x68, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xb15}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfff}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffff9}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_NODE={0x2c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xef}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0xa8}}, 0x40000) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="010000000000000000000a"], 0x3}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x40, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 324.851811][T10922] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:14 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) shutdown(r1, 0x1) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0xc8000004, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:14 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) socket(0x21, 0x7, 0x102) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000040)=[{&(0x7f0000000640)="8a", 0x1}], 0x1, 0x0) [ 325.046734][T10933] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_init_net_socket$rose(0xb, 0x5, 0x0) 04:37:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x380, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x168, 0x1a8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:14 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c802000078010000780100007801000000000000780100003002000030020000300200003002000030020000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005801780100000000000000000000000000000000a9000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e76e21d01c93ebbcd2e96299e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000001600000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff015410f3caf6e6"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x380, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x168, 0x1a8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:15 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffffba, &(0x7f0000000340), 0x0, 0x0, 0x6686}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'team_slave_0\x00', 0x21}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') r4 = openat$hwrng(0xffffff9c, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, 0x0, 0x0) getdents(r3, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ptrace$setopts(0x4206, 0xffffffffffffffff, 0xc, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f00000000c0)={0x3ff, 0xc10c, 0x8, 0x100, 0xed}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:37:15 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f00000000c0)={0xef9, 0x9, 0x4, 0xe000, 0x7f, {0x0, 0x2710}, {0x3, 0x8, 0x7, 0xe6, 0x81, 0x20, "9f9aff64"}, 0x4, 0x4, @planes=&(0x7f0000000080)={0x7, 0x1f, @mem_offset, 0x2}, 0x6, 0x0, r4}) connect$ax25(r6, &(0x7f0000000140)={{0x3, @bcast, 0x6}, [@default, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) ioctl$RTC_PIE_ON(r5, 0x7005) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x380, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x168, 0x1a8, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 325.452296][T10958] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:15 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0xffffd000) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_DEVICE_ATTR(r3, 0x4018aee2, &(0x7f00000001c0)={0x0, 0x3ff, 0x0, &(0x7f0000000180)=0x3}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/183) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 325.745310][T10974] xt_hashlimit: overflow, try lower: 0/0 [ 325.758817][T10976] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x4000000000000001, 0xffffffffffffffff, 0x12) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet6(0xa, 0x4, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x80001d00c0d0) close(r0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80001d00c0d0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r3, 0x0, 0x0) 04:37:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:15 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0xc, 0x11, r0, 0xfffff000) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000980)=ANY=[@ANYBLOB="b70200000d440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ff0808ff3e640200000000005502faff037202000404000001007d60b7030000001000006a0a00fe10000000850000002b000000cf000000000000289500000000000000a81bbfa3982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c45841e41f44ae7c5e84e6e3a94b574d2eb38a748355f0b886bd005362df1d4fdd860db580892243533e0f242a46b3009a54f4077db0d4968a384b0f59c7919b89bd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e2704653f620f5898a327a5ce13419b2272c3c7fea60493073807c4b7bbaed91f33fb382d91ae8e18c9b6c9f0322ec5f1c7cc5869ff455896712198c4e2ddf8b86e714229527ca40b24cf96a02fa0892728807982d90e116bba29bb744af81a4cd8f3ad2d9582da7a9ba2ebdd0b424ac416e66af9ebcfea905d37cf226312cb81ec8439ced91f5c93f7f4d256c1d06e7fa69393596301460142f83b422dbe57dfdb06dcf91fd2464cb130033d649d2110cf2e1f4682c24a305447c5e0807af806f952e8df0b1766ec7ecbd061772daa52a38539295d3fea7a7e66944121ff041143edfa9f1bf98d0a38edc345415c42d3d2dd3339d32a4796cd7ce18b68bc37e061d33357d6a39d33c702576cc2a8881015c9e1842fbdf1bb75c663e3d76c7a37c5cd62e12102f237bbf60c0a3bf07d55b3888418de2b2ad23000000004ccddf247dd2c712e2eaf7d432e968122cc5dcaa7ba330963b7093a58a02f0a1c9dd5d9faa8c418f6a63fec7690a9b01737c8caaf78ba58f4c70c096def8c5555c3c5a811c06f3c94c53d41ea96893599e630e66924d9f354e677cb5dd0dc69286847effbf2e23e337ed689330558d954acadfe8b6d81aa781b9c72bd53a109dd3de02e242f0dfc1b3f7d569059bd5fea696a40baa38be132ec35a96b8a03bfd086879f7a92616e99867875fba88c7d7f92efb8d79587ba10a776f1c6c1b67f4fd21b1c277e2fba4afc94ef75eeed5fe5537447351c78b3d291bb251df079747253f2865ede9092b5717b2e0dbff1c414e5e676525d8fcaacd1471c6782781cb1d45bb393166380595e7fe819e5a08c28e4b8e408439a26d3f542dfcae813eddda4d43c35abb43e52f5b66f00bfd9d4633d98f5c03f1c5ed713e2b5de312ac0ae18cbd9974767787cc82571502025029582b12d17aeb581fceaf5d3f2f5a4f900f77c0c3671f4e01f46292f91ce2bff83843b81cea742eb49bf8fed5320c604f5effe7eccf6940bc6d75913714eed29068d93e89d8cdad024e4abb661642e65eadec97b23cba1f3002822e9f1f262ec6143e3381ae3db19d02148d440bc94591873e49941a92f0de54747e89ab98109a00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_init_net_socket$rose(0xb, 0x5, 0x0) [ 326.040698][T10991] xt_hashlimit: overflow, try lower: 0/0 04:37:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:15 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000400)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x1c) dup3(r2, r0, 0x80000) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) vmsplice(r6, &(0x7f0000000380)=[{&(0x7f00000000c0)="f7482b35e7faba4ab6a6fc64af0a6581d65db01b36497f7f8a0e035f74d2ffeb131c3140b66d0b5f63c91d092aaeff115567f15f688d1d2439", 0x39}, {&(0x7f0000000a40)="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", 0x1000}, {&(0x7f0000000100)}, {&(0x7f0000000140)="5e94d402a5e12e373ef0c3c5e86c37b0e704db7bd75eff6e6bc237d28e47def87b675d35bf597da6b28fec7e91f013a6096d5831bc72213bd58b13e42079c47f9a42128a636a590fed0ab231ac13702796e7993a9c37f19c79e061031310fdb2588c9222b017c2cadbb8db2dee4ce91a79a0daabdc8fd35e8f17acc4d585f0a888fdad0463adcde530cbab125e861000a4fa59b0eea3561443ed6b6c18918b4e137f74b6ebb3a842c710", 0xaa}, {&(0x7f0000001a40)="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", 0x1000}, {&(0x7f0000000200)="9f6d6138726127b0217cb8dfd0704f9d5a76b9b124bb5628710a56025d7b3284bdefdec430af5c1c68c998713e03eb571b55a7948eec4a8c2d32c42d5fb518edddcb1c4c211f977f3c8aaa2683fb3e448ea5245a50b70a22ac8aa955f30298aa074390f05db762efa13cd9b93639b4832ba23f37b851c73f9bd3a09bf133bd8046b38aa726cf7d435b4840e078f43904e73edbf2b54c7c657735596295b46bc7cec4b8e78d78a4fcaa57e59294b8f692272ec5e6e257afc66f2882831f0cf500947a18ae303603b2933731e04c3e9c74", 0xd0}, {&(0x7f0000000300)="7e5bf29913e0bfb48559f4f90f22fb4c1624f62b4e1e948fb68dc2cde50a0922a42f8f284c08f51b31906da51c03133b3c292be403281cb3c584412b7e922551a8526ee7a90b48ccf1ed8277be9226dc4f9a875b52cc52ac55eeeab541c9cf2f3b710c02d31311ef09f5", 0x6a}], 0x7, 0x8) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 326.185925][T10998] xt_hashlimit: overflow, try lower: 0/0 [ 326.234986][ T26] audit: type=1800 audit(1587789435.919:28): pid=10987 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16126 res=0 [ 326.278729][T11006] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 326.292933][ T26] audit: type=1800 audit(1587789435.919:29): pid=10999 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16126 res=0 04:37:16 executing program 3: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0xc, 0x11, r0, 0xfffff000) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:16 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='sy\x00\x00\x00\x00\x00\x00\x00?d5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\@b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00g\xeb8\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB="7200000000000000000000000000000000000000000000220200000003359fef4502050000000000000000007801000000000000780100003002000030020000300200003002000030020000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000005801f8010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a700cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000800000000000000000000000000000000000020004e4f545241434b0000000000edffffff0000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000007000980000000000000000000000000000008000000000002800000000000000000000000000000000000000000000000000000000000004feffffff0000000000000000000000807037e264a09f278ad09b42f89bd0671b02e9254901d2645007a3453577b1910d9cd7a62cffad4c7014122fb138df750afdc7143ca122440e090493e1a613c81b70bdd4fe79c3d2339778f069439d8b786ed843c3943639f3afbe82a2efbe88028f41c7ff3cc8b64170b2c000e1575831f06d4d2d79f21bbe33105150237d7793cecc3130ff12c6a404a6510c0b5bf18d980a2b2764292bcd6e20b5085f51f865fe7a0f5db5d14f5e0fd82980431da868a2d995887cefac0aa8dbb84680ee8fa372b21807cced2d58e1d09553fbdde680ec51964538059d00000000000000001923fce78b0183552dc20af64c"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x4010, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000300)={@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3e}}, 0x4, 0x1, 0x1}}, {&(0x7f00000001c0)=""/224, 0xe0}, &(0x7f00000002c0), 0x6}, 0xfffffffffffffe40) rt_sigaction(0x1a, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000003c0)={0x50, 0x2, 0x1, 0x604}) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup2(r6, r6) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_udp_int(r7, 0x11, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r5, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000140)=0x4) 04:37:16 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:16 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x7a, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3400000010000108000000060000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000c002b8008000100", @ANYRES32, @ANYBLOB="08001b000000000018b0b31277508554c10a5328f4c6d47dfb7878aebefedb5e5c2fef5ca0f842fa9833b64d2ab8ea7981be35e24047f7df75c6f1b500236fb5056d1ff72f7d49361330ecf189f823af4f4a3d7d5d445a029a1db66f4a8aed74273acd09b66a292509fc674f66ca604e"], 0x34}, 0x1, 0xfcffffff00000000}, 0x0) r0 = socket(0xf, 0x3, 0xfffffffd) sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x0, @remote, 'veth1_to_bridge\x00'}}) 04:37:16 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:16 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x800002, 0x13, r0, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000001c0)=""/21, 0x15, 0x20, &(0x7f0000000200)={0x1a, 0x101, 0x1, 0x0, 0x8, 0x1, @dev={[], 0x37}}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$rose(r3, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null]}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r4, r4) r5 = dup2(r4, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$l2tp6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000100)=0x20) mbind(&(0x7f0000284000/0x3000)=nil, 0x3000, 0x4000, &(0x7f0000000080)=0x1ff, 0x2, 0x1) 04:37:16 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:16 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:16 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, &(0x7f0000000080)={0x4e85, {{0xa, 0x4e22, 0x2, @mcast2, 0x2a}}, {{0xa, 0x4e20, 0x100, @mcast1}}}, 0x108) 04:37:16 executing program 3: syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="1020f5f29008070009000000030000000c00000009", 0x15, 0x1400}], 0x0, 0x0) r0 = socket$caif_stream(0x25, 0x1, 0x0) connect$caif(r0, &(0x7f0000000180)=@dgm={0x25, 0x400, 0x8}, 0x18) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f00000000c0)={0x44a, "f3edad8069cc818c38fde5b7f8b84acbf7b77928b964d2ccc8a6cf274d549ce3", 0x3, 0x40, 0x6, 0xfffeffff, 0x8, 0x4, 0x9}) 04:37:16 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 327.191558][T11051] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 327.199554][T11052] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 327.231487][T11052] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 04:37:16 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 327.283589][T11052] F2FS-fs (loop3): Invalid segment count (0) [ 327.289686][T11052] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 04:37:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x318, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 327.380231][T11052] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 327.392661][T11052] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 327.415752][T11052] F2FS-fs (loop3): Invalid segment count (0) [ 327.428411][T11052] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 04:37:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5"}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:17 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x5, 0xffffffffffffffff, &(0x7f0000000040)="0435e87feefc105fb4821134da968079759ba5ce83473653963dcf091258ae4cc88e38f97a639849fbaeef", 0x2b, 0x4}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, &(0x7f00000000c0)="1906e0f7bb43fc85aade1f81f1a79f2f3af470392d6a917ca2f903c2d7ba81b762abaf2d22b7bffa7e521ac42d79523b28d99bb69e30272e149d4332946ad63b02c0ec286484c269aedba0", 0x4b, 0x2d6}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0xffff, 0xffffffffffffffff, &(0x7f0000000180)="6fec9acbc2724748585e52a089e55b69683e00f8368222ba21b7242be9edcbc16c22bf85ecdafd07e41aa34c6fdc3200252321d96e18c81c01e0776a80", 0x3d, 0xfff, 0x0, 0x1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x6, 0xffffffffffffffff, &(0x7f0000000200)="82be9de23ce1ef176ed276e1382e03500c633451d698dd05404ef95e76e7a23e67e008a082c7c187de6a55fcfc6957816b9c4cc07a8b16888262c4000f7eb7f0e9fb900c114f9dff7abc62dacbde07abfd", 0x51, 0x80000000000000, 0x0, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x1000, 0xffffffffffffffff, &(0x7f00000002c0)="c355699da3ba0caaf107cd14af9d8a2952dd26b7c6db741107322aabead0252e4dc0473687047c5372e75698a5624bba7877851f70f86273125d9a586d1e67f4fd37f4ac41e6a6450f9464ffa297dbef67bc7a998ce27d637d5197bf593b1a85f7d577cf76ffa00ac0de17a6d716d0b87ac57e1b62ac34388e74b409c91887d9f4ece1b726e6b566c9d578f4bf68c8e3d66f311dc50091d87a5f", 0x9a, 0x7}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x100, r0, &(0x7f00000003c0)="94afe09754e720c2ccc7007985a06816610b3ecf53cb59f3f6cf17dd4f806c42b4068064b989b0f882dcb7fdfbd489e4", 0x30, 0x3f, 0x0, 0x3, r3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x3, 0x1, 0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x3, 0x0, 0x0, r5}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0xc8ef, r7, &(0x7f00000004c0)="e02dccca7d15d9f4", 0x8, 0x47, 0x0, 0x1}]) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) sigaltstack(&(0x7f0000aea000/0x3000)=nil, 0x0) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 04:37:17 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='s@stemgm0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xedE\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd94\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34\xe6e7\x1f\xd6\xc6\xe1\x90\xd5+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\x00\x00\x00\x00\x00\x00\x19\xca\x14\xe3\xa1\x85\xa0y,X\xe7\x03\x13\x9a\a\xec\xa8\xe06]\x01;\xeby\xed\x97.R|\xe8\xc4\xc3p\xedb\x9c\x06\x01\x9a#6\r\xba\b\xf5\xfcd\x05\xd8gD\xb9\\\x13\xce!u\x90\xf4\x87@\xd3\xb2\xfd\xae\xd1%O#C\xa9vd\xfbh]v\xd4\x17N D;\xf69\xf1\xb5\xef\xceu0\xdf\xa5\x9a\xb3\xe8\x9d\vZ\xaa\x95JG\xf6O\xa7g\xe5\x02owf9G\xad\x83\xe0M\xc2b\xecD\xeb\xe4\xcf\x05\xac\xdb\v\xde\xb1\xfe\x98\xd5\xd2\xe2\xbd`\xc2AG\xa4\x94\xfbX\x926\xee[\t\x18\xb6h%\x97I*\xd7\xb8\xf9\xf4\x91`\xc0\x15g\f\'\xbeK\xbb}\xdby\xb4$\x06n\x86\xefc\xfc!\x1b[\a\xa3X}3&B\x1c\xa3K\xc6\xa4\xbb\x97/\xdc\xe1', 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000004c0)={0xb106, 0x1, 0x6, 0x1, 0x1, [{0x4010, 0x4, 0x3ff, [], 0x80}]}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8)={r4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000008c0)={r4, 0xbe, "03b1726f437fccf5ced671f0279c75ba05e18b5b89669ece24e533013b12437a0a0c58982117ba4bbff1b9b5298fdbb7400b9da118732f048b15a18ed2cbc3a8051e3dbf5b0b8fabbbbbceda9690933cbaa8d79acc7d2f2859c0fe2994683d6b9093348811ddb61002f84d66330ab05119a025513547866794c1fc97567e0a32f030ec936d8ac4d675e31bbfdfb91bf76e02af4c0886af9af65a88acccfb049aa5ee6b72e34cc85cd39903bebbe3627eebff6541d993c9112d11cb5f83e5"}, &(0x7f0000000540)=0xc6) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x6e100, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r5, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x150, 0x1, 0x1, 0x801, 0x0, 0x0, {0x3, 0x0, 0x8}, [@CTA_TUPLE_REPLY={0x14, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_NAT_SRC={0x58, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0x54, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}]}, @CTA_SEQ_ADJ_ORIG={0x24, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x8000001}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x3}]}, @CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x4}, @CTA_NAT_DST={0x34, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @private1}, @CTA_NAT_V6_MINIP={0x14, 0x4, @private0={0xfc, 0x0, [], 0x1}}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @local}]}, @CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @CTA_SEQ_ADJ_ORIG={0x2c, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x1}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xfffffffe}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1ff}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x172b}]}, @CTA_MARK_MASK={0x8}]}, 0x150}, 0x1, 0x0, 0x0, 0xc0}, 0x41) setsockopt$nfc_llcp_NFC_LLCP_RW(r5, 0x118, 0x0, &(0x7f00000000c0)=0x3, 0x4) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5"}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 327.643021][T11080] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:17 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b5b07073f0036680000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000e700004932550f1b3f0e92000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002203d7b8d6824a"], 0x78) 04:37:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5"}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:17 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$TIPC_MCAST_REPLICAST(r3, 0x10f, 0x86) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x8, &(0x7f0000b4a000)={0x0, 0x0, 0x0, {[0xfffffffffffffffe]}}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:17 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x8aa041, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./bus/file0\x00', 0x83) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x200100, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0xc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x180000, 0x0) [ 327.906225][T11095] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 328.105377][T11105] xt_hashlimit: overflow, try lower: 0/0 04:37:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x1}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='fdinfo/4\x00') sendfile(r1, r3, &(0x7f0000000040)=0x100060, 0xa808) [ 328.255814][T11108] xt_hashlimit: overflow, try lower: 0/0 04:37:18 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:37:18 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 328.416320][T11122] xt_hashlimit: overflow, try lower: 0/0 04:37:18 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000008c0)='systemem0md5sum$\x00\xf7\x02\xb2\xd4\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xff\x01\xae\x98\xfc\xde\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\x00\x00\xe34+:\xd4\xe6\x10;\x03\xd7_\x98\x02\x00\x00\x00\x00\x00O\x00f\xcf?\x05\x82s!l+*\'\x9e\xd4o\xbaU\xf4%\x96\n\x8es^+h\xf9\xff\xeey\xd6\xa2\xea\xb45\xaa\xff\xf2_\x01c\x0f\xfc\xa5J\x17\xcf\xcc\x86\x13]0\xdb\xc1\"d\x99\xa9d\xf9E\xd9\xe0\x98\xe0\x82#\\\xff\xff\x1dE\xc5\x8e\xf39\xf0\xe2uSk\tXL\xf1|\xc8\x1e\xa2d\x9dO\xcd\xb2\x90\x9c:\x15?\x15\x92\xe3>\xf4\x04m\x8d\xfa\xbb\xf3\r\xdd{\x1c\x1aT\xce\"\x86\xcc\xda\xe6\xed\xa8\x94\xe7\x1d\x8d\xa31\x1bc<\xd4\xfaV&\n\x167\f\x95wq\xf8\xa4\xb9\xab\xe4I\xb4-\x93\x9f\xb1\x9d_\xe9\xaeLH\x9eT\x86\x98jx\xfb\xc4\\j\xd2\xc3\xb0\xa1fkX\x96\xb7h\f\xc6\xae\xfa\xe0B\n\x1a\x91FaZ\f?\xcf-\xc8\xe5<0\xa6\x0e\xfem(u\xe1q\x9f\xe6\xa3MO\xfd\x1c\x90v\x9b\x84\x95\x97o\x03\xb2\'\x9b\v\x19\xe3\xcb\xd8\xfa\xf5,Yjt\\\x17*`\x8f\x88\xae\xf0\xf2\"\xe3\xc7X\xaf\x11\xbf\v\xe9\x8e}\xa9\x8cc\x98y\xed\x15\xa8z\x10*\xdf\x00\xce\x0f$\x011\x8f\xf4\xdc[\x95\xdfhn#\x16iYhN\xe4\xa2\xf8\xb9\xc7*m\a\vwQF\xd7`\x944\xd8\xf2|\xf0\t+n\xa3\x10?\xd1\x00e\xe2\xa84x\xc0Y\xac\xe5\xaa\x18t\xb1\xef\xb6x\xa2\x8e\x92\x0e\xaa\x03\x16\xa6\x89_\x98|\xde\xff\x9b\b\xb9d\xff\xd4\x93\r\xf9\x15>GGE\x9b9\x15\x00\x7f\v\xc2\x1fj\xff\x05\xaeD\xd9\xa2\xa2\xb9~\x9c!*\xc2\x9a}\f\xf4\x82\xb8\x85i\x14\x05jG\xadVr\xca{Q\\?I\xac\xef\xef\x05Mc\xf5\'\xe5\xc6N\xccF\x96P\xc9\v|\x96\xeeA~\xbe\x05\xf0\x90\xa7\r\xee\xa7i\xa5r;\xaa\xd8K\xb9\x1a\xf7q\x88I\xe5\xb5[\x1eV>1)9\xab', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f00000001c0)=0x4, &(0x7f0000000300)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x50800, 0x0) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r5, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="4400df00", @ANYRES16=r6, @ANYBLOB="020025bd7000fedbdf25080000002e00070073797374656d5f753a6f626a6563745f723a73656d616e6167655f726561645f6c6f636b5f743a7330000000"], 0x44}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) sendmsg$NLBL_UNLABEL_C_STATICLIST(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x34000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r6, 0x100, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}]}, 0x24}, 0x1, 0x0, 0x0, 0xde41f69f284a00df}, 0x480c0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:18 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5bcf, 0xf077}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x5) fcntl$setstatus(r0, 0x4, 0x2000) syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000440)={0x2, &(0x7f0000000380)=""/167, &(0x7f0000001b40)=[{0x0, 0xba, 0x2, &(0x7f0000000200)=""/186}, {0x0, 0x0, 0x0, 0x0}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000002d80)='TIPC\x00') sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x800) creat(&(0x7f00000001c0)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') syz_open_dev$sndmidi(&(0x7f0000653fee)='/dev/snd/midiC#D#\x00', 0x200, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 328.525153][T11129] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 328.531325][T11128] xt_hashlimit: overflow, try lower: 0/0 04:37:18 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 328.736600][T11139] xt_hashlimit: overflow, try lower: 0/0 04:37:18 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x13, &(0x7f0000b4a000)={0x0, 0x40000001, 0x0, {[0x400000000000008]}}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:18 executing program 1: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000008c0)='systemem0md5sum$\x00\xf7\x02\xb2\xd4\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xff\x01\xae\x98\xfc\xde\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\x00\x00\xe34+:\xd4\xe6\x10;\x03\xd7_\x98\x02\x00\x00\x00\x00\x00O\x00f\xcf?\x05\x82s!l+*\'\x9e\xd4o\xbaU\xf4%\x96\n\x8es^+h\xf9\xff\xeey\xd6\xa2\xea\xb45\xaa\xff\xf2_\x01c\x0f\xfc\xa5J\x17\xcf\xcc\x86\x13]0\xdb\xc1\"d\x99\xa9d\xf9E\xd9\xe0\x98\xe0\x82#\\\xff\xff\x1dE\xc5\x8e\xf39\xf0\xe2uSk\tXL\xf1|\xc8\x1e\xa2d\x9dO\xcd\xb2\x90\x9c:\x15?\x15\x92\xe3>\xf4\x04m\x8d\xfa\xbb\xf3\r\xdd{\x1c\x1aT\xce\"\x86\xcc\xda\xe6\xed\xa8\x94\xe7\x1d\x8d\xa31\x1bc<\xd4\xfaV&\n\x167\f\x95wq\xf8\xa4\xb9\xab\xe4I\xb4-\x93\x9f\xb1\x9d_\xe9\xaeLH\x9eT\x86\x98jx\xfb\xc4\\j\xd2\xc3\xb0\xa1fkX\x96\xb7h\f\xc6\xae\xfa\xe0B\n\x1a\x91FaZ\f?\xcf-\xc8\xe5<0\xa6\x0e\xfem(u\xe1q\x9f\xe6\xa3MO\xfd\x1c\x90v\x9b\x84\x95\x97o\x03\xb2\'\x9b\v\x19\xe3\xcb\xd8\xfa\xf5,Yjt\\\x17*`\x8f\x88\xae\xf0\xf2\"\xe3\xc7X\xaf\x11\xbf\v\xe9\x8e}\xa9\x8cc\x98y\xed\x15\xa8z\x10*\xdf\x00\xce\x0f$\x011\x8f\xf4\xdc[\x95\xdfhn#\x16iYhN\xe4\xa2\xf8\xb9\xc7*m\a\vwQF\xd7`\x944\xd8\xf2|\xf0\t+n\xa3\x10?\xd1\x00e\xe2\xa84x\xc0Y\xac\xe5\xaa\x18t\xb1\xef\xb6x\xa2\x8e\x92\x0e\xaa\x03\x16\xa6\x89_\x98|\xde\xff\x9b\b\xb9d\xff\xd4\x93\r\xf9\x15>GGE\x9b9\x15\x00\x7f\v\xc2\x1fj\xff\x05\xaeD\xd9\xa2\xa2\xb9~\x9c!*\xc2\x9a}\f\xf4\x82\xb8\x85i\x14\x05jG\xadVr\xca{Q\\?I\xac\xef\xef\x05Mc\xf5\'\xe5\xc6N\xccF\x96P\xc9\v|\x96\xeeA~\xbe\x05\xf0\x90\xa7\r\xee\xa7i\xa5r;\xaa\xd8K\xb9\x1a\xf7q\x88I\xe5\xb5[\x1eV>1)9\xab', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f00000001c0)=0x4, &(0x7f0000000300)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x50800, 0x0) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r5, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="4400df00", @ANYRES16=r6, @ANYBLOB="020025bd7000fedbdf25080000002e00070073797374656d5f753a6f626a6563745f723a73656d616e6167655f726561645f6c6f636b5f743a7330000000"], 0x44}, 0x1, 0x0, 0x0, 0x4000040}, 0x40) sendmsg$NLBL_UNLABEL_C_STATICLIST(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x34000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r6, 0x100, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}]}, 0x24}, 0x1, 0x0, 0x0, 0xde41f69f284a00df}, 0x480c0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:18 executing program 5 (fault-call:6 fault-nth:0): clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:18 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 329.160465][T11149] rpfilter_check: 1 callbacks suppressed [ 329.160473][T11149] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 329.186656][T11152] FAULT_INJECTION: forcing a failure. [ 329.186656][T11152] name failslab, interval 1, probability 0, space 0, times 1 [ 329.266775][T11152] CPU: 0 PID: 11152 Comm: syz-executor.5 Not tainted 5.7.0-rc1-syzkaller #0 [ 329.275501][T11152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.285726][T11152] Call Trace: [ 329.289068][T11152] dump_stack+0x11d/0x187 [ 329.293495][T11152] should_fail.cold+0x5/0xf [ 329.298008][T11152] __should_failslab+0x82/0xb0 [ 329.302791][T11152] should_failslab+0x5/0xf [ 329.307213][T11152] kmem_cache_alloc_node_trace+0x37/0x610 04:37:19 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4) ioctl$SNDRV_PCM_IOCTL_RESUME(r3, 0x4147, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KDGKBENT(r5, 0x4b46, &(0x7f0000000080)={0x0, 0x7f, 0xe48}) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 329.312953][T11152] kvmalloc_node+0x6b/0x100 [ 329.317462][T11152] xt_alloc_table_info+0x46/0x80 [ 329.322409][T11152] do_ip6t_set_ctl+0x18f/0x333 [ 329.327188][T11152] nf_setsockopt+0x67/0xa0 [ 329.331614][T11152] ipv6_setsockopt+0x118/0x130 [ 329.336386][T11152] tcp_setsockopt+0x6c/0xb0 [ 329.340893][T11152] sock_common_setsockopt+0x5d/0x80 [ 329.346150][T11152] __sys_setsockopt+0x1d6/0x380 [ 329.351134][T11152] __x64_sys_setsockopt+0x6b/0x80 [ 329.356261][T11152] do_syscall_64+0xc7/0x3b0 [ 329.360777][T11152] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 329.366667][T11152] RIP: 0033:0x45c829 [ 329.370575][T11152] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.390175][T11152] RSP: 002b:00007faf7eeb2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 329.398845][T11152] RAX: ffffffffffffffda RBX: 0000000000501880 RCX: 000000000045c829 [ 329.406868][T11152] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 329.414842][T11152] RBP: 000000000078bf00 R08: 00000000000000b5 R09: 0000000000000000 [ 329.422899][T11152] R10: 00000000200008c0 R11: 0000000000000246 R12: 0000000000000006 [ 329.430871][T11152] R13: 0000000000000a37 R14: 00000000004d6358 R15: 00007faf7eeb36d4 04:37:19 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000280)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYRES64=r1, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYPTR64, @ANYBLOB="f253e5f008838e355da03e57272fb7db2ddb2f555eba80e24d5df44fb19aff3cf1c2f9eadb4c85eed99cb1f50d9b4ae1028123073895304038f55c3a5834bf93414a4e6c5182db0a1c943e54388ff5e858d85e9f9beaccd6597294f8f4bd35567979a1877358d29258e2cff8d189bbc010264bb86f32d722f37a4b088007b5244423ba79b975cb27b156d19d2d1d49ac9ce6e6a1a975510edd38771b26f5b651101d9d17bfb3a6832282514f925053ec2711a9d03f1e12c2cc612c836603cedc371f7b58c153b8619038f67a932c60ada9c00af1e64ff9ab39c07ab47701e8ecbcb76e11b81041a51353787f05a5560ccf6d39e8", @ANYRES64, @ANYRESOCT=r0, @ANYRES64, @ANYPTR64], @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYPTR64, @ANYPTR, @ANYRESHEX], @ANYBLOB="a86a590650620fb526", @ANYRES32=r0], @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000500)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRES16]], @ANYRES16=0x0, @ANYPTR64, @ANYRES64, @ANYRESOCT], @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYRES32=r0, @ANYRESDEC], 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_uring_register$IORING_UNREGISTER_BUFFERS(r3, 0x1, 0x0, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f0000000140)={0x3ff, 0x4955554e, 0x70, 0x80000000, 0x3, @stepwise={{0x2, 0x222}, {0x5, 0x5}, {0x2, 0x40}}}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000080)={{0xc1, 0x4}, 'port0\x00', 0xc0, 0x10450, 0xfffffffc, 0x4, 0x20, 0x18, 0x35, 0x0, 0x1, 0x6}) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r6, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {0x0, 0x4109}, {0x4c, 0x18, {0x114, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x68, r6, 0x200, 0x70bd28, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x80000000, @link='broadcast-link\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0xfffffffffffffffc, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x48, 0x0, 0x0, 0x7, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:37:19 executing program 5 (fault-call:6 fault-nth:1): clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:19 executing program 1: prctl$PR_GET_SECCOMP(0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x14200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000036c0), 0x12) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000140)={0x57, 0x7d, 0x980c, {0x0, 0x50, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, '', 0xa, 'md5sumbdev', 0x13, '$[em0!em0$\xf7\xb7&md5sum'}}, 0x57) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000300)={0x9, 0x3, 0x4, 0x70000, 0x68fc, {r2, r3/1000+10000}, {0x3, 0x0, 0x81, 0x7, 0x0, 0xff, "620f7833"}, 0x8, 0x4, @offset=0xda, 0x4, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_START(r4, 0x4142, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000036c0), 0x12) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0xb, 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b80)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0x7a00}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) 04:37:19 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000001c0)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90Y`\x80\xb3U\x86k\"\xb0\x13\xffB_\x93|I\xca\x8a\xba\x8dg\x1d\xc9\xf2\r\x0eJ\xe8\n\x15f-\x05\xce\x98\xbfY<\\f\xc2\"C\xfb\xe0\x8c\xa5*\xcd\xe0\xff\xf9\x9c\xff\xc7\xac\x1a\x86%\xce\xf8\x85\xddQ\x9e\xb2\x8d\xb6~7\x88\x15/9\xfd?%\x00\xeev\x03\x92\xa8\x90\x9b\x95\"C_\xb7\xa89\x02)-\x1c\xd2-\x99F\xe8E\xd6\x87_$\x15\xc9D\x1a\xc9\x98}9>e\x00\xcb1\xf8\xc9\x92\xb4\xdeI\x9b\x7fq\xc9\x15\xca\x1ah\\\xdb\x11\xd79\xa8\x9a\xc6?\xb4\xddz\x92_>\xe2\xcbp,\xde\xac\n\xdd\x96\xf0\xd85Tp\x04\xebi', 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$TIPC_GROUP_LEAVE(r3, 0x10f, 0x88) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r4 = gettid() process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r5 = gettid() process_vm_writev(r5, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101) kcmp(r4, r5, 0x3, r6, r0) [ 329.900241][T11178] FAULT_INJECTION: forcing a failure. [ 329.900241][T11178] name failslab, interval 1, probability 0, space 0, times 0 [ 329.948846][T11178] CPU: 0 PID: 11178 Comm: syz-executor.5 Not tainted 5.7.0-rc1-syzkaller #0 [ 329.957725][T11178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.967775][T11178] Call Trace: [ 329.971159][T11178] dump_stack+0x11d/0x187 [ 329.975503][T11178] should_fail.cold+0x5/0xf [ 329.980091][T11178] __should_failslab+0x82/0xb0 [ 329.984854][T11178] should_failslab+0x5/0xf [ 329.989270][T11178] kmem_cache_alloc_node_trace+0x37/0x610 [ 329.994995][T11178] ? do_ipv6_setsockopt.isra.0+0x2a8/0x2d10 [ 330.000907][T11178] ? should_fail+0x7c/0x2fd [ 330.005426][T11178] kvmalloc_node+0x6b/0x100 [ 330.009944][T11178] xt_alloc_entry_offsets+0x45/0x60 [ 330.015152][T11178] translate_table+0x109/0xc10 [ 330.019924][T11178] ? __virt_addr_valid+0x120/0x180 [ 330.025048][T11178] ? __read_once_size.constprop.0+0xd/0x20 [ 330.030940][T11178] ? constant_test_bit.constprop.0+0x9/0x20 [ 330.036851][T11178] do_ip6t_set_ctl+0x21d/0x333 [ 330.041643][T11178] nf_setsockopt+0x67/0xa0 [ 330.046125][T11178] ipv6_setsockopt+0x118/0x130 [ 330.050933][T11178] tcp_setsockopt+0x6c/0xb0 [ 330.055436][T11178] sock_common_setsockopt+0x5d/0x80 [ 330.060638][T11178] __sys_setsockopt+0x1d6/0x380 [ 330.065585][T11178] __x64_sys_setsockopt+0x6b/0x80 [ 330.065868][T11182] device geneve2 entered promiscuous mode [ 330.070615][T11178] do_syscall_64+0xc7/0x3b0 [ 330.070642][T11178] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 330.086691][T11178] RIP: 0033:0x45c829 [ 330.090593][T11178] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.110269][T11178] RSP: 002b:00007faf7eeb2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 330.118678][T11178] RAX: ffffffffffffffda RBX: 0000000000501880 RCX: 000000000045c829 [ 330.126648][T11178] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 330.134617][T11178] RBP: 000000000078bf00 R08: 00000000000000b5 R09: 0000000000000000 [ 330.142595][T11178] R10: 00000000200008c0 R11: 0000000000000246 R12: 0000000000000006 [ 330.150741][T11178] R13: 0000000000000a37 R14: 00000000004d6358 R15: 00007faf7eeb36d4 04:37:20 executing program 1: prctl$PR_GET_SECCOMP(0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x14200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000036c0), 0x12) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000140)={0x57, 0x7d, 0x980c, {0x0, 0x50, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, '', 0xa, 'md5sumbdev', 0x13, '$[em0!em0$\xf7\xb7&md5sum'}}, 0x57) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000300)={0x9, 0x3, 0x4, 0x70000, 0x68fc, {r2, r3/1000+10000}, {0x3, 0x0, 0x81, 0x7, 0x0, 0xff, "620f7833"}, 0x8, 0x4, @offset=0xda, 0x4, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_START(r4, 0x4142, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000036c0), 0x12) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0xb, 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b80)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0x7a00}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) 04:37:20 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0xe, &(0x7f0000b4a000)={0x0, 0x40000000, 0x0}, 0x0, 0xffffffffffffffb3, &(0x7f0000000080)) prctl$PR_SET_DUMPABLE(0x4, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 330.422197][T11194] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:20 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x400281, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000fc0)={0x44, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4e88012}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r4, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040001}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:20 executing program 1: prctl$PR_GET_SECCOMP(0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x14200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000036c0), 0x12) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(0xffffffffffffffff) write$P9_RSTAT(r1, &(0x7f0000000140)={0x57, 0x7d, 0x980c, {0x0, 0x50, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, '', 0xa, 'md5sumbdev', 0x13, '$[em0!em0$\xf7\xb7&md5sum'}}, 0x57) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000300)={0x9, 0x3, 0x4, 0x70000, 0x68fc, {r2, r3/1000+10000}, {0x3, 0x0, 0x81, 0x7, 0x0, 0xff, "620f7833"}, 0x8, 0x4, @offset=0xda, 0x4, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_START(r4, 0x4142, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000036c0), 0x12) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0xb, 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b80)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6, 0x5, 0x7a00}, @IFLA_GENEVE_COLLECT_METADATA={0x4}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) 04:37:20 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x11, 0x800000003, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xff04) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, 0x0, r5, r3}, 0xb8fb, 0x0, 0x0, 0x8000}) quotactl(0x101, &(0x7f0000000440)='./file0\x00', r2, &(0x7f0000000480)="35ec884437440d26b775fc820b3a070481f06883e475fe371adc75bccaab8c0882429601486318adb895705bda84cbe2bc4515e993f6f6016fe253cfa4c4d9a10ddfc2616317c80c21f842c6279fe6477bd5c85a6780ba7614e5db748ce095ce9c9797a027fe741d3c9a0d9449f13dfe505511ed23e0d2524ec55ca46db7f5be388d684db7a3d38459cf8a73b10fdf67ec5f7e2f176b82cb667da196e054a5eea8ea9bc9801f1e9b13b5c0707987a76f0adf1bbefa63a751136ce15eba8fc779d97783bf7bbd5d289cbabd0917d2fdb783820e93a7542172") [ 330.579458][T11201] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 330.734093][T11207] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:20 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = accept4(r0, &(0x7f0000000000)=@rc={0x1f, @fixed}, &(0x7f0000000080)=0x80, 0x80000) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x276}, 0x4) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[]}, 0x1, 0x0, 0x0, 0x40800}, 0x0) 04:37:20 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socket$pppoe(0x18, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCL_SCROLLCONSOLE(r3, 0x541c, &(0x7f0000000080)={0xd, 0x1}) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 331.069838][T11217] xt_hashlimit: overflow, try lower: 0/0 04:37:20 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x6, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 331.150428][T11220] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:21 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', 'systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90'}) 04:37:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8)={r4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={r4, 0x2, 0x2381, 0x9}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={r5, @in6={{0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1}}}, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0x2, 0x0, 0x0, 0xe, 0x1, [], "f3"}, @datasec={0xa, 0x0, 0x0, 0xf, 0x3, [], '\x00\x00\x00'}]}}, &(0x7f00000001c0)=""/246, 0x36, 0xf6, 0x8}, 0x20) 04:37:21 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x3d0, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 331.364864][T11231] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 331.413486][T11235] BPF:[1] Invalid name_offset:2 04:37:21 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b03140012800b00010067656e6576b57e15127285b465000004000280"], 0x34}}, 0x0) 04:37:21 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 331.533917][T11246] IPVS: ftp: loaded support on port[0] = 21 04:37:21 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:21 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c802000078010000780100007801000000329f84a9e4da00000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000004000000000000000000000006000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e6700e364065603306274d966d40000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9c825ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c7465720000293538e8dca287e1613e0000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c7465720000000000000000000000000000000000000000000000000000000020004e4f545241434b000c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0xc, 0x80010, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x1d8, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000005e000700000000000069aa0000000000", @ANYRES32, @ANYBLOB="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"], 0x24}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x1465, 0x80000000, 0xffffff1b, 0x23, 0xffffffffffffffff, 0xe9, [], 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RLCREATE(r5, &(0x7f00000000c0)={0x18, 0xf, 0x2, {{0x20, 0x1, 0x4}, 0x4ac}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SOUND_PCM_READ_RATE(r3, 0x80045002, &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:21 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000080)=@default) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$bt_rfcomm(r1, &(0x7f00000000c0)={0x1f, @fixed={[], 0x11}, 0x19}, 0xa) setsockopt$IPT_SO_SET_REPLACE(r3, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:21 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x5, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 332.059305][T11289] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:21 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_wait(r3, &(0x7f0000000080)=[{}, {}, {}, {}], 0x4, 0xfffffff9) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 332.163520][T11246] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 332.191785][T11246] IPVS: ftp: loaded support on port[0] = 21 04:37:22 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x6, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 332.252847][T11302] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 332.327536][T11246] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 332.345883][ T182] tipc: TX() has been purged, node left! 04:37:22 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xffff, 0x80000) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) mmap(&(0x7f000057e000/0x1000)=nil, 0x1000, 0x300000d, 0x80010, r1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:22 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x8, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 332.521547][T11334] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 332.552057][T11336] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:22 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000024000b05000000010070a6edffffff00", @ANYRES64=0x0, @ANYBLOB="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"/588], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0xd, &(0x7f0000000100)}], 0x492492492492642, 0x0) 04:37:22 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0xb, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:22 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x10, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:22 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x53, &(0x7f00000003c0)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000000400)=0x28) r2 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/804], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r4 = gettid() process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_open_procfs(r4, &(0x7f0000000040)='net/hci\x00') 04:37:22 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x11, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:22 executing program 1: r0 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x4, 0x0, 0x0, 0x2000000, 'syz0\x00'}, 0x6, 0x1, 0x0, r0, 0x1, 0x0, 'syz0\x00', &(0x7f0000000140)=['/dev/kvm\x00'], 0x4, [], [0x9ca, 0x0, 0x84, 0x1ff]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000840)='/dev/null\x00', 0x10000, 0x0) r2 = getpid() r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r3, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x7, &(0x7f00000004c0)=""/235) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="01000000e330e2def4c059d370f80f5702ed6d657464657692696d30000000000000000800040000000000000000"], 0x44}}, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r5, 0x0) ioctl$int_in(r5, 0x800000c0045005, &(0x7f0000000040)=0x10) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r6, 0x4040ae70, &(0x7f00000002c0)={0x5, 0x4fb, 0x9, 0x4}) write$FUSE_INTERRUPT(r5, &(0x7f0000000080)={0x10, 0x0, 0x8}, 0x10) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x8491) clock_gettime(0x1, &(0x7f0000000640)) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f00000005c0)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0xff, 0x80000001, 0x9, 0x1, 0x7, 0xff, 0x800, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x24]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) clone3(&(0x7f00000000c0)={0x14021600, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50) 04:37:22 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x12, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:22 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f0000000700)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000400)={0x298, 0x1, 0x3, 0x5, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFQA_CT={0x6c, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x30, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @initdev={0xac, 0x1e, 0x8, 0x0}}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x14}}]}, @CTA_PROTOINFO={0x38, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x34, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x1}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x7}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x2}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x8}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x4}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x9}]}}]}, @NFQA_EXP={0x94, 0xf, 0x0, 0x1, [@CTA_EXPECT_TUPLE={0x90, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0x3b}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00'}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}]}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfd299e8913084e7d, 0x7}}, @NFQA_EXP={0x2c, 0xf, 0x0, 0x1, [@CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}]}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0x1}}, @NFQA_EXP={0x140, 0xf, 0x0, 0x1, [@CTA_EXPECT_MASTER={0x78, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, [], 0x1}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_NAT={0xb0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x38}}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x68, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x7f}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @rand_addr=0x64010100}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x92}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}]}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x4}]}]}, 0x298}, 0x1, 0x0, 0x0, 0x20040040}, 0x4800) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:23 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1293674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b8000000000000000000000000000000000000421ba03b98be807c49bcae57c5d06d0000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f0000000080)={0x3, 0x4b, 0x8}) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:23 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:23 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet6_dccp_buf(r3, 0x21, 0x80, &(0x7f0000000080)=""/71, &(0x7f0000000100)=0x47) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:23 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000080)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:23 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x14, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:23 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCRSACCEPT(r2, 0x89e3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:23 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:23 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESDEC=r3]], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:23 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E \x00\x00\x00y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xdd$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+\xba\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 334.134423][ T182] tipc: TX() has been purged, node left! 04:37:25 executing program 1: r0 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x4, 0x0, 0x0, 0x2000000, 'syz0\x00'}, 0x6, 0x1, 0x0, r0, 0x1, 0x0, 'syz0\x00', &(0x7f0000000140)=['/dev/kvm\x00'], 0x4, [], [0x9ca, 0x0, 0x84, 0x1ff]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000840)='/dev/null\x00', 0x10000, 0x0) r2 = getpid() r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r3, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x7, &(0x7f00000004c0)=""/235) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES16=r4, @ANYBLOB="01000000e330e2def4c059d370f80f5702ed6d657464657692696d30000000000000000800040000000000000000"], 0x44}}, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r5, 0x0) ioctl$int_in(r5, 0x800000c0045005, &(0x7f0000000040)=0x10) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r6, 0x4040ae70, &(0x7f00000002c0)={0x5, 0x4fb, 0x9, 0x4}) write$FUSE_INTERRUPT(r5, &(0x7f0000000080)={0x10, 0x0, 0x8}, 0x10) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x8491) clock_gettime(0x1, &(0x7f0000000640)) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f00000005c0)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0xff, 0x80000001, 0x9, 0x1, 0x7, 0xff, 0x800, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x24]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) clone3(&(0x7f00000000c0)={0x14021600, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50) 04:37:25 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:25 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x16, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 335.485337][T11419] rpfilter_check: 4 callbacks suppressed [ 335.485347][T11419] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:25 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x4b4, 0x8080) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000380), &(0x7f00000003c0)=0x4) getsockopt$IP_SET_OP_VERSION(r2, 0x1, 0x53, &(0x7f0000000080), &(0x7f00000000c0)=0x8) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:25 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x17, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 335.682023][T11430] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:25 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x18, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:25 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/790], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x2, 0x0, {[0xffffdffffffffffd]}}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:25 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:25 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:25 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1b, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:25 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/804], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:26 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:27 executing program 1: r0 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x4, 0x0, 0x0, 0x2000000, 'syz0\x00'}, 0x6, 0x1, 0x0, r0, 0x1, 0x0, 'syz0\x00', &(0x7f0000000140)=['/dev/kvm\x00'], 0x4, [], [0x9ca, 0x0, 0x84, 0x1ff]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000840)='/dev/null\x00', 0x10000, 0x0) r2 = getpid() r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r3, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x7, &(0x7f00000004c0)=""/235) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="5b00080077d3cd44785e251166c157d44e35cf0bc8a351b5112c6e30400dd642bd66ad68fec89ef339bb185cf1d7f327652bcce50337a88fb641043f7680e128221989db0321a35da5f8d674f425fa011f195c49b5c58bf629ce4318d880f10c724be55afad7efa4778115bcf5377abc866f4d108aa6d8fa1f0d3156e49e1dcc1fa8ad563ae3fb3e4011dbdb188a22e709d39550fa6f328534a791d0a66703c58de2857f473f06c6c7884ee7c8efd26ad96dec8cb284d082d97e1d7b6660ec6d06ec89ee95376cea55525a8f0774ac3e6af94954c998dbe33f0e905937a8e7017d9c591b0bd558aada1aa302bae34dd609b494cf152ad2ca4c5c8bd2fc2b160a60e9a52b6f24aa6790a591", @ANYRES16=r4, @ANYBLOB="01000000e330e2def4c059d370f80f5702ed6d657464657692696d30000000000000000800040000000000000000"], 0x44}}, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r5, 0x0) ioctl$int_in(r5, 0x800000c0045005, &(0x7f0000000040)=0x10) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r6, 0x4040ae70, &(0x7f00000002c0)={0x5, 0x4fb, 0x9, 0x4}) write$FUSE_INTERRUPT(r5, &(0x7f0000000080)={0x10, 0x0, 0x8}, 0x10) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x8491) clock_gettime(0x1, &(0x7f0000000640)) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f00000005c0)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0xff, 0x80000001, 0x9, 0x1, 0x7, 0xff, 0x800, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x24]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) clone3(&(0x7f00000000c0)={0x14021600, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50) 04:37:27 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/1048], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x86bbf000) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) io_setup(0x800, &(0x7f0000000000)=0x0) r3 = socket(0x40000000029, 0x805, 0x0) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f00000001c0)="17", 0x1}]) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f00000000c0), 0x4) dup2(r4, r4) signalfd(r4, &(0x7f0000000080), 0x8) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:27 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1d, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0xc31d, 0x7, 0xffffffff, 0x2, 0x5, 0x100000001, 0x0, 0xe}}) r2 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:27 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1e, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:27 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:27 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000a40)=ANY=[@ANYBLOB="7261774a01000000000000000000000000006f5398c4947eb8250000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b15dc673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b000000000000000000000000000000000000000000000000b176002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff0e7309b90a0310a586b3d854c84ba830fe41026c54d6e7d12e7018e1022edbfc75824dfb074d32d570c835c9cede379d0bd8907b5164e2006230a776616b2c5e9470895ba8ac5d5d3486c0fd9610afb9ca2b0c3833d6ad1d356faa666041a595fad7145d630b5b8666c0fecdcd573652205083fae0aff235fbba0770d1"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r4 = socket(0x5, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) getsockname$packet(r4, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x100000421) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x1d8, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000005e000700000000000069aa0000000000", @ANYRES32=r6, @ANYBLOB="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"], 0x24}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="71941c00", @ANYRES16=r3, @ANYBLOB="00012abd7000fddbd7d99cede6e188c625149e6a2fc08fc7dda99eca549a1b539b305984b7b32f15bc42f477933d6b652e7fee6efc673b98b8b248572602dd3f88831a1132a2b7bc90641cf021fcc0d751fb6b1f89dff15db2ab14fb50eae1dff758fcc82e9b28ad60e3a769bd005f157d55edea72ee9838c788c316744c5de2eabc3d83b15e630e011177da4bac07b0e9d779e06f810bf94e25d18d5a30fcfeae572832b7857bdb315036b25ffb1a66583d95df44d541fac3f0b0099909da03a4fa4e366cb095df24db59d05bd2911a4e8e827b9d36f411047e661b2e", @ANYRES32=r6, @ANYBLOB], 0x5}, 0x1, 0x0, 0x0, 0x4004c050}, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:27 executing program 1: r0 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000380)={{0x4, 0x0, 0x0, 0x2000000, 'syz0\x00'}, 0x6, 0x1, 0x0, r0, 0x1, 0x0, 'syz0\x00', &(0x7f0000000140)=['/dev/kvm\x00'], 0x4, [], [0x9ca, 0x0, 0x84, 0x1ff]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000840)='/dev/null\x00', 0x10000, 0x0) r2 = getpid() r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r3, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x7, &(0x7f00000004c0)=""/235) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="5b00080077d3cd44785e251166c157d44e35cf0bc8a351b5112c6e30400dd642bd66ad68fec89ef339bb185cf1d7f327652bcce50337a88fb641043f7680e128221989db0321a35da5f8d674f425fa011f195c49b5c58bf629ce4318d880f10c724be55afad7efa4778115bcf5377abc866f4d108aa6d8fa1f0d3156e49e1dcc1fa8ad563ae3fb3e4011dbdb188a22e709d39550fa6f328534a791d0a66703c58de2857f473f06c6c7884ee7c8efd26ad96dec8cb284d082d97e1d7b6660ec6d06ec89ee95376cea55525a8f0774ac3e6af94954c998dbe33f0e905937a8e7017d9c591b0bd558aada1aa302bae34dd609b494cf152ad2ca4c5c8bd2fc2b160a60e9a52b6f24aa6790a591", @ANYRES16=r4, @ANYBLOB="01000000e330e2def4c059d370f80f5702ed6d657464657692696d30000000000000000800040000000000000000"], 0x44}}, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r5, 0x0) ioctl$int_in(r5, 0x800000c0045005, &(0x7f0000000040)=0x10) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r6, 0x4040ae70, &(0x7f00000002c0)={0x5, 0x4fb, 0x9, 0x4}) write$FUSE_INTERRUPT(r5, &(0x7f0000000080)={0x10, 0x0, 0x8}, 0x10) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x8491) clock_gettime(0x1, &(0x7f0000000640)) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, &(0x7f00000005c0)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0xff, 0x80000001, 0x9, 0x1, 0x7, 0xff, 0x800, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x24]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) clone3(&(0x7f00000000c0)={0x14021600, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50) 04:37:27 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 338.145290][T11505] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:27 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) chdir(&(0x7f0000000080)='./file0\x00') msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:28 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x23, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 338.354349][T11517] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:28 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2a, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:28 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:28 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000680)='systemem0md5s\x86\xe6\xa6\xcb\x1f\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7q/\x7f\x92s\xda\xe1RT\fV\x96\x85\xf3j\x993\xb5\tE\xd9E\xee\x7f`\x8c\\\xf6/\x13\xfcJ\xe0\xe91\xee\xcf]\xbck\f\xcav\x9e\xe7\x16\xb0\xa0\xee\x98\xd5rWv\xee\xa8\x9b\xb7,\xdf\xf2\xe56m\a\xfb\x96\x00\x00\x00 \xb68\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9?\x17w\xc5\xa5\x1dF\xcf0o\xc2\x9b\xb1\a\xcf\x9e\xdfLB4\x18E\xca\xba\xacw\xd5\\x\xad\\\xb0\\k\xd1\\\xcfa\xcc4\xae\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00HQ\x18\xbf\xeb\xfb\xbb\xebf\xc3\xdbp\xf7\xf9\xca\xa8_[\x10@\xd8R\xb2\t\xf3\x89\xe8\xefZ\xb7B\xfa\xf4\x06\x0f\xea\xc1E\xa0\xe1\xab=\xc7v\xf6\x1eSv', 0x2c70962ac0e0af86) prctl$PR_GET_SECUREBITS(0x1b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_OPEN(r3, &(0x7f0000000140)={0x20, 0x0, 0x1, {0x0, 0x11}}, 0x20) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:28 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2c, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:28 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:28 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2d, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:28 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2e, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x20, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/bsg\x00', 0x40000, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000001700), 0x4) sendmmsg(r0, &(0x7f0000001480), 0x400000000000339, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000040)="1fe803f987ec197d9fab725ad68f830d5910785c5a1f3dab2ff74fae85496400a0ee1ee89b7eecf013f2f715fefe136f9889db8170fab7fc45cb6db3e62951997f05beb0eb89bf6f8b7e1c699b6a2fd7eac1e7d6775b812b22a42a107a1954bdd8dcfa623e6812cc7799db8ae168bdfac4726578ab5e94df167be453ff9a5528c16edbfa37530ad8840e4083e351f99a3a59e08de192cec489479c091b1baca741ba3cdfc51589f37e40dccd1924eb", 0xaf) 04:37:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xd4, 0x4, 0x8, 0x3, 0x0, 0x0, {0x2, 0x0, 0xfffc}, [@CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xfffffffb}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xd9e}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x200}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0xf2b}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8}]}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x735}]}, @CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x154}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x10000}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0xd84}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x8080}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x7fff}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x20040001}, 0x20004000) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000340)={0x1ff, @remote}) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) socket$pppoe(0x18, 0x1, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0205649, &(0x7f0000000100)={0xa30000, 0x5, 0x0, r3, 0x0, &(0x7f00000000c0)={0x9b0908, 0x200, [], @value=0x8}}) ioctl$BINDER_SET_MAX_THREADS(r6, 0x40046205, &(0x7f0000000140)) 04:37:28 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2f, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:29 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_open_procfs(r2, &(0x7f0000000080)='net/sco\x00') 04:37:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x7ffffffd, @loopback}, {0x2, 0x0, 0xffffffff, @ipv4={[], [], @loopback}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000100)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), r4}}, 0x18) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r5, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_S_TUNER(r7, 0x4054561e, &(0x7f0000000080)={0x60f, "b1fc8bc0391b09fdf24b8dedcc30155f542f39f5d4e524be953bfbdc56db2ece", 0x0, 0x2, 0x6, 0x4, 0x2, 0x3, 0xe5e5, 0xd3}) timer_gettime(r5, &(0x7f0000000000)) dup2(r0, r1) 04:37:29 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x30, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 339.452906][T11578] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:29 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[], 0x0) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:29 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x31, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:29 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$addseals(r3, 0x409, 0x0) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:29 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x32, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:29 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x33, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 339.756033][T11598] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:29 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f0000000080)={0x80000001, 0x4f881030, 0x1, 'queue0\x00'}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 339.912960][T11607] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:29 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x35, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:29 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x36, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:30 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x37, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:30 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x38, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x7ffffffd, @loopback}, {0x2, 0x0, 0xffffffff, @ipv4={[], [], @loopback}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000100)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), r4}}, 0x18) ioctl$EVIOCGRAB(r1, 0x40044590, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r5, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_S_TUNER(r7, 0x4054561e, &(0x7f0000000080)={0x60f, "b1fc8bc0391b09fdf24b8dedcc30155f542f39f5d4e524be953bfbdc56db2ece", 0x0, 0x2, 0x6, 0x4, 0x2, 0x3, 0xe5e5, 0xd3}) timer_gettime(r5, &(0x7f0000000000)) dup2(r0, r1) 04:37:32 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3fe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r0, &(0x7f0000002e40)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}}], 0x1, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r7, r7) r8 = fcntl$dupfd(r6, 0x406, r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, r2, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8, 0x1, r4}, {0x8, 0x1, r8}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r0}, {0x8, 0x1, r10}, {0x8, 0x1, r0}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000080}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:37:32 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3a, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x20, &(0x7f0000000440)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) clone3(&(0x7f00000003c0)={0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0, {0x36}, &(0x7f0000000300)=""/179, 0xb3, &(0x7f0000000480)=""/237, &(0x7f0000000200)=[r0, 0x0], 0x2}, 0x50) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xfff}, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x0, 0x8, 0x6, 0x0, 0x3, 0x9b0e, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffbfffd, 0x6}, 0x2949, 0x0, 0xfffffffe, 0x0, 0x0, 0x3}, r1, 0x3, r2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x3, 'veth1_to_bridge\x00', {0x8}, 0x43}) syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000700)=0x1c, 0x800) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000740)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000680)="3581ba7669f34a02226c2bae1ecc987cbc24b1a7108d82d865ad37fdaea17bec32f671330ff592e0773284c70c7b08a33c00c8b2b3c3af249d558ab723", 0x3d, r4}, 0x68) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r5 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000580), 0x80800) sendto(r5, &(0x7f00000005c0)="5843f26579b7", 0x6, 0x8000, &(0x7f0000000600)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e23, @multicast1}, 0x4, 0x3}}, 0x80) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @empty}}, 0xbde, 0x3, 0x0, 0x0, 0x30d, 0x0, 0x5}, 0x9c) 04:37:32 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3b, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:32 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3c, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:33 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3e, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:33 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x41, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:33 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x42, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:33 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:33 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x46, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:33 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x48, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:33 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x49, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:34 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4a, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:34 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x20, &(0x7f0000000440)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) clone3(&(0x7f00000003c0)={0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0, {0x36}, &(0x7f0000000300)=""/179, 0xb3, &(0x7f0000000480)=""/237, &(0x7f0000000200)=[r0, 0x0], 0x2}, 0x50) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xfff}, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xb, 0x0, 0x8, 0x6, 0x0, 0x3, 0x9b0e, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffbfffd, 0x6}, 0x2949, 0x0, 0xfffffffe, 0x0, 0x0, 0x3}, r1, 0x3, r2, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)={0x3, 'veth1_to_bridge\x00', {0x8}, 0x43}) syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000700)=0x1c, 0x800) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000740)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000680)="3581ba7669f34a02226c2bae1ecc987cbc24b1a7108d82d865ad37fdaea17bec32f671330ff592e0773284c70c7b08a33c00c8b2b3c3af249d558ab723", 0x3d, r4}, 0x68) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x404e21, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r5 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000580), 0x80800) sendto(r5, &(0x7f00000005c0)="5843f26579b7", 0x6, 0x8000, &(0x7f0000000600)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e23, @multicast1}, 0x4, 0x3}}, 0x80) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @empty}}, 0xbde, 0x3, 0x0, 0x0, 0x30d, 0x0, 0x5}, 0x9c) 04:37:35 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4c, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:35 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4d, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:35 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4e, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:35 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x2, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:36 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x4, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:36 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x5, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:36 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x6, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:36 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x7, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:36 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x9, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:36 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3e, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:36 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x63, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000200)="ec5222bfe81002e4a45a229c00453018d40c974d004c2850dc2f5806845023d1ece19221094776b08d78cafd773be1e7ae5b3e565d8182f251b5621fd416661e5ce770d948ed8f61afd5533e6f1038d65fc1509f354c49b6c1c9191420e61edcc43ab84803b33791f52b481fcdbe45d31a76758b9acd4f177962f78e36", 0x7d}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 04:37:38 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x7fffffe, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:39 executing program 1: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) close(0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_calipso(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) close(r0) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000140)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x7, @private2={0xfc, 0x2, [], 0x1}, 0x2}}, 0x24) recvmmsg(r2, &(0x7f0000000800)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1e8}}], 0x400000000000953, 0x42, 0x0) unshare(0x40000400) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000100)={0x6, 0x109, 0x0, 0x4, 0x1, "fdd10eedede7fd9610c317acd97d8d81e14421", 0x1, 0x1000}) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f00000000c0)={0x3c, 0x0, 0xfe00000, 0xfffffab9, 0xe2ea}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$rfkill(r4, &(0x7f0000000180), 0x8) [ 349.837814][T11820] IPVS: ftp: loaded support on port[0] = 21 [ 350.546538][T11822] IPVS: ftp: loaded support on port[0] = 21 [ 350.614398][ T182] tipc: TX() has been purged, node left! 04:37:40 executing program 1: accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0x10) close(0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_calipso(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) close(r0) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000140)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0x7, @private2={0xfc, 0x2, [], 0x1}, 0x2}}, 0x24) recvmmsg(r2, &(0x7f0000000800)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1e8}}], 0x400000000000953, 0x42, 0x0) unshare(0x40000400) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000100)={0x6, 0x109, 0x0, 0x4, 0x1, "fdd10eedede7fd9610c317acd97d8d81e14421", 0x1, 0x1000}) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f00000000c0)={0x3c, 0x0, 0xfe00000, 0xfffffab9, 0xe2ea}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$rfkill(r4, &(0x7f0000000180), 0x8) 04:37:41 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x8000000, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:41 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:41 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x1fffffbf, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 352.082561][ T182] tipc: TX() has been purged, node left! 04:37:43 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000200)='tmpfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SOUND_MIXER_READ_VOLUME(r1, 0x80044d19, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f0000000040)=0x9, 0x4) [ 353.653183][T11896] tmpfs: Unknown parameter 'm' [ 353.745023][T11896] tmpfs: Unknown parameter 'm' 04:37:43 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_open_dev$binderN(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) renameat(r2, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) r4 = socket$inet(0xa, 0x0, 0x84) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x9515, 0x800, 0xfffffffd}, &(0x7f0000000100)=0x98) 04:37:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x20000cf8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:44 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:44 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x2, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 354.431232][T11921] xt_hashlimit: overflow, try lower: 0/0 04:37:44 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x3, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:44 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x4, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:44 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_open_dev$binderN(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) renameat(r2, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) r4 = socket$inet(0xa, 0x0, 0x84) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x9515, 0x800, 0xfffffffd}, &(0x7f0000000100)=0x98) 04:37:44 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x5, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:44 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x6, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:44 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x7, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:45 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xa, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:45 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x48, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:45 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_open_dev$binderN(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) renameat(r2, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) r4 = socket$inet(0xa, 0x0, 0x84) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x9515, 0x800, 0xfffffffd}, &(0x7f0000000100)=0x98) 04:37:45 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x4c, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:45 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x68, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:45 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x6c, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:45 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x20000cf8, 0x0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:45 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x74, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="800000003804000019002100e60100006c00fec9000000000100000001000000000000000000010080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) [ 356.385503][T12013] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 04:37:46 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x7a, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(r2, r1, 0x0, 0x2f98) 04:37:46 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xd0, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 356.700381][ T26] audit: type=1804 audit(1587789466.371:30): pid=12031 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir181831918/syzkaller.Dmsfyj/101/cgroup.controllers" dev="sda1" ino=15975 res=1 04:37:46 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x168, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:46 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x1a8, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:46 executing program 1: sendmsg$rds(0xffffffffffffffff, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000014c0)=""/4103, 0x1007}], 0x1}, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00') preadv(r0, &(0x7f00000017c0), 0x1ab, 0x0) 04:37:46 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x1b1, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000500)={0x8, {{0x2, 0x4e22, @broadcast}}, 0x1, 0x6, [{{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x4e22, @rand_addr=0x64010100}}, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x36}}}]}, 0x390) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000000)={0x0, 0xffffff80}, 0x8) write$tun(r0, &(0x7f0000000480)={@void, @val={0x2d, 0x0, 0x0, 0x0, 0x32}, @ipv6=@gre_packet={0x0, 0x6, "bc7d94", 0x4e, 0x2c, 0x0, @remote, @mcast2, {[@dstopts={0x2f}], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [0x0]}}}}}, 0x80) 04:37:47 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x216, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 357.377025][T12058] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0xb 04:37:47 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x300, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:47 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x308, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x101000, 0x0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000000c0)={0x7f, "9e18f9f3c02986e087639c791d4f22eb43f9669617602d8c44dbee35fed5d1be", 0x10, 0x98, 0x0, 0x1, 0x2}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80, 0x80) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(r2, 0x4144, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x54, r3, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0x2c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0x54}}, 0x4040000) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0xc842, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r5, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008080}, 0x24000040) fcntl$setlease(r1, 0x400, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/udplite6\x00') r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r6, &(0x7f0000000680)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0x84, r7, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x93}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_macvtap\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x48800}, 0x10) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_EDITDEST(r8, 0x0, 0x489, &(0x7f00000006c0)={{0x73, @rand_addr=0x64010101, 0x4e24, 0x1, 'ovf\x00', 0x0, 0x2, 0x5a}, {@loopback, 0x4e23, 0x3, 0x0, 0x3, 0x401}}, 0x44) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000740)) [ 357.906907][T12086] xt_hashlimit: overflow, try lower: 0/0 04:37:47 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x320, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 357.981222][T12094] IPVS: set_ctl: invalid protocol: 115 100.1.1.1:20004 [ 358.045005][T12097] IPVS: set_ctl: invalid protocol: 115 100.1.1.1:20004 04:37:47 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x338, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:47 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[]}}, 0x20040000) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 04:37:47 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x342, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:48 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f00000001c0)={{0x2, 0x0, @reserved="61378f25cfe0d2e5c5e52cf4fb17f2813d164c942d755429d46f946f469d7dd6"}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x484402) ioctl$TCSETSF2(r3, 0x402c542d, &(0x7f0000000040)={0x1ff, 0x8000, 0x2, 0x4, 0xff, "dcf3188a96a35185ad4922ca9dcad13a23417e", 0xfff, 0x9}) syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)="600b42e006000a0090040300001af5c97824", 0x12, 0x400}], 0x0, 0x0) 04:37:48 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x500, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:48 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x600, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:48 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="005042488c23492881ad93efde8b98bd459e7e3a44"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[]}}, 0x20000000) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 04:37:48 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x700, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:48 executing program 1: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)="db342103adb38bc525bbbe2961", 0xd) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e759efc741c209790162f0f8a5c7d3794ec1b58c698e2a50b08f907873286648f1c4fda78dad730d7abebc70099f1f3c0ad048499b0fbf984ff1d91b4c269ca6618741c0500254a62a169b240d79a80f8d7609fe80b5e3a9f3697f48126627620a5c9c100a8a7bcf888694ed2f2744218470050330a31120d40b1fff68bd1911ee82f7ce8bc7b71b15e01031f8d36ce5be8d2ab7721506984b91e8a9e70a8687d06bd409a78c05b7f8b2899c5"], 0xc0) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xc4, 0x1) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_any='access=any'}]}}) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 04:37:48 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x803, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:48 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000007, 0x12, r0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0x800c5012, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0xe38, 0x7, 0x3, 0x2, 0x15, "1a327accc87bf387009b800cc905e8d03d21ca"}) 04:37:48 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x92f, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:48 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) recvmsg(r1, &(0x7f0000000300)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/122, 0x7a}, {&(0x7f0000000180)=""/30, 0x1e}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x3, &(0x7f0000000200)=""/237, 0xed}, 0x3) sendmsg$NLBL_CIPSOV4_C_REMOVE(r2, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000380)={&(0x7f0000001a40)={0x28c, 0x0, 0x1, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x8c, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc034}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x68ce}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2b967c69}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6f39}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x29b6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x32a501d4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2d84d315}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x525b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3667fd4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x59b2af31}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x169d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x401}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x33ea6b61}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb5e8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5f9a4a1e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}, {0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xa0, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x50f5be8e}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x59106aeb}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x46}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x20a97fbb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xef}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x35}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f6f69c7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2483a372}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x328a84e7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xdda3a37}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x80}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x44965bb2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b2318db}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x84, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x93}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xec}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x147a96ac}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x783d849b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5b}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x349c4c0b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6519eb2c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x686b2ccb}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x26044fa6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x64}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x524ab6ce}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x30, 0x8, 0x0, 0x1, [{0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x62e761eb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5a562f73}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x28c}, 0x1, 0x0, 0x0, 0x2404c845}, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:48 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 359.209366][T12162] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:49 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xa00, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:49 executing program 4: clone(0x3a3dd40040243a01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r0, 0x20, 0x70bd2d, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}}, 0x10) r1 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:49 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x1602, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 359.543525][T12179] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x19, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = socket$inet(0x2, 0x2000080001, 0x84) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8000, &(0x7f0000000100)=0x8, 0x0, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000003c0)={0x9, 0x0, 0x10001}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000400)={0x7, r3}) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x7ff}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) dup2(r4, r4) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r4, 0x8983, &(0x7f0000000080)={0x0, 'veth0_to_bond\x00', {0x8000}}) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1, 0x0, 0x0, 0x3f8}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) futex(&(0x7f0000000140)=0x1, 0x1, 0x0, &(0x7f0000000340)={r6, r7+10000000}, &(0x7f0000000380)=0x1, 0x0) r8 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendto$inet(r8, &(0x7f0000000200)="c13024d79477c0c7a8d326e4d13c77027fb67b89c243fd8db56fac5b8373199d8394e1190df084fbcf7015e48dc152a50b9670558e23f676ea029b325b79723f7421814387029b9fb4f2b03a7ccea693bd43d4391d2ce36ccc71862432427b31ad35f925f8b15f14200100f545d2b344eeb6567319a71678de5c31d766c57758b47926ca23b892e1baadf739ed46fdb08d099214fdddfc9add118bfc631bc3f4947a242313bb776001a054fee20caa054e63a6eb52aebaf43ce09fd744e32c6c28c803", 0xc3, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e24, @loopback}, 0x10) 04:37:49 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x2000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:49 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000005c0)='scstemem0md5s\xe8B\xdd\xed\x93\xcf\b\x0eH\x98E\\|b\xd5y\x97\xd7\x993\xb5\t\xec\x13\xef\x92\xfbR\xf9\xc3\x11\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xbc\xda\xbb\xeb\tv\xe1q*\x82x\xf4\xcb\x00\x00\x00\b\x00\x00\x00\a\x00\x00\x008\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9\xafuf\xf9\xc6[\xb1CT\xb2\x00C-\xf2\xaf\x82\xf0\x10\x89Z\xe8\t\xd4\x1bO\xe4\x1eu|\xf2\xadW\xe9]F\xb6.\xf86\xdb4\t\xf6\xd6V\x0f/\xf9\xce]\t\x8b\xbb\x93\x16\xde\x02T\xb8M\xdd\xa8\xad\xf1\xec}\x89\x0e\xb6h\x9b\xf9\b[\xdb\xfb\x1b\xa6\xa9a', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000001a80)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SOUND_MIXER_WRITE_VOLUME(r3, 0xc0044d1e, &(0x7f0000000480)=0x17) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000540)={0x7a53, 0x7, 0x4, 0x20000000, 0x101, {0x0, 0x2710}, {0x4, 0x0, 0x6, 0xa, 0x1, 0x9, "73890928"}, 0x1000, 0x4, @offset=0x7, 0xff, 0x0, 0xffffffffffffffff}) write$UHID_INPUT(r4, &(0x7f0000000a40)={0x8, {"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", 0x1000}}, 0x1006) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000500)=0x3, 0x8) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r5, r5) dup(r5) rt_sigaction(0x3e, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0xfffffffffffffdbe, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:49 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x1) prctl$PR_SET_DUMPABLE(0x4, 0x0) r3 = dup(r0) write$cgroup_subtree(r3, &(0x7f0000000100)={[{0x2d, 'pids'}, {0x6, 'pids'}, {0x2b, 'cpu'}, {0x2b, 'memory'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x2b, 'pids'}]}, 0x2f) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:49 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x2003, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 359.932659][T12202] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="130009003200ef03000000000000000000000000400001003c0000000b000100736b626d6f640000280002802400020000d91e29f372422deeb10ead869d09700300"/84], 0x1}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_buf(r2, 0x6, 0x21, &(0x7f0000000000)="955b2ff2cf4027a6f64a0035aacae2137b2e0e535c2822d753260754fdda32ab0db080ffe18ed75eb3f7590749019208baaf40115108d7d19d85febbab4123ba762512abcfa9", 0x46) 04:37:59 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000040)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/220, 0xdc}], 0x1, 0x0) syz_open_procfs(r2, &(0x7f0000000080)='setgroups\x00') 04:37:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f0000000000)=""/29) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000080)=@req={0x2, 0x197e, 0x3, 0x20}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 04:37:59 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x2f09, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:59 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, r0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setlease(r3, 0x400, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x13e55eb50af1af94}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x54, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x100}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r5}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x54}, 0x1, 0x0, 0x0, 0x50}, 0x20000800) r6 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x208200) ioctl$EXT4_IOC_GROUP_EXTEND(r6, 0x40086607, &(0x7f0000000000)=0x9) sendfile(r1, r6, 0x0, 0x8000fffffffe) 04:37:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80080, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r4, 0xc01064bd, &(0x7f0000000180)={&(0x7f0000000100)="656b455be37223344ca799fde4263076de06b890032ca65ce5f24d286c056ead658f564c3ccb0cc5094657d87b81dacea3903242db2339d50a36bfd8f7733293b99b55ab76e895825cbf55e0a17ecfdcf0f681bb41270fcde2", 0x59, 0x1}) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r2, 0xc01064bd, &(0x7f00000001c0)={&(0x7f00000000c0)="0a0529f48e519766b14b052691da4a052568b959daf817b66b", 0x19, r5}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) clone(0x10000180, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)="72084e9e") 04:37:59 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SOUND_MIXER_WRITE_VOLUME(r3, 0xc0044d19, &(0x7f0000000380)=0xc) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f00000004c0)=0x6) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) timerfd_settime(r4, 0x0, &(0x7f0000000440)={{0x0, 0x989680}}, &(0x7f0000000480)) ioctl$VT_RESIZE(r5, 0x5609, &(0x7f0000000040)={0x7}) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x4000, 0x0) pwritev(r6, &(0x7f00000003c0)=[{&(0x7f00000000c0)="06f0eec4146c38b8ee1ae614d4f61246c5fc0ec6c14733a61f044a2f8ccfe7e6ee6be7e078aede3fd8599f54bab0523e745f19d9f4c0950318ef38753a1225992a233b5eafd046c5c3b2a7bfab92b7ceb0e72088dbc34aaa2f76bb5d6aafe0579ec96ffc492e1c88147670ab9254ce75d313e3bfda8d0f", 0x77}, {&(0x7f0000000140)="7546db1d632290991298571a08d0bf915ef6e479c8ae1fe8ff4af6231525281779bbbaef1806deee15b8802454c611c812db5e5976910e6ae186f0a32dcd886a58cc64ba15ae708f861fb004daa5a1c03e53b879989c7e9c3a4ec27fefdf6c4e42333223c88c225246c8147646b5bf173458f51ce68b696c5180", 0x7a}, {&(0x7f00000001c0)="e026393c5bd68f7b28cbf83e290c4a8a4f1cdeeb96e97c4bb9e6ad389d585ce9098e494637009c49ad285967f9ea215cbbbbe9283a6658eb0cb11bc6e644fcbdc407e58a85948a771fb7f94038a5a4fdb27d43c320fac72654ea87eed617f5e9ac5e4f948114bf821c7f24e94837509c97b935", 0x73}, {&(0x7f0000000240)="64447638012d758a0545697a660a0e1603159c70b1154f4fd81cc49a853cb49d388215a9f8a33914599c10417cff691c5c83e52ff50308eab55e30564573a52ae46eee2be3bfcdbc8095cda6ff6f56c55a2363a93210f0648313aa81d27f6ae315f9739955d91591adb073f3e49a3fcd5cc076c97bb08d66dcef8e5a9dbb6d93b255246074f54b173f51", 0x8a}, {&(0x7f0000000300)="63c1d3c25273852919d92ad6719b948fe049a7167d6f01f6a94547ea9dfca4be6e72fb9d1c45232fe6ea0c69b9eb2b27c81d39d433ff05de835d2549a1427b24bcf8f996b0f85cbe8b01eb4e7a23340ecd4be94e714c91a7e2a37973dab3eea0a12391003f2c44d94b034350add8c7", 0x6f}, {&(0x7f0000000380)}], 0x6, 0x3) [ 369.488156][T12219] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:59 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x3803, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:37:59 executing program 3: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') times(0x0) execve(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', &(0x7f0000000300)=[&(0x7f0000000000)='\x00', &(0x7f0000000100)='}\x00', &(0x7f0000000240)='sysfs\x00', &(0x7f0000000280)='sysfs\x00'], &(0x7f0000000600)=[&(0x7f0000000340)='\x00', &(0x7f0000000380)='bdev(\x00', &(0x7f00000003c0)='posix_acl_accessposix_acl_access}\x00', &(0x7f0000000400)='sysfs\x00', &(0x7f0000000440)='sysfs\x00', &(0x7f0000000540)='sysfs\x00', &(0x7f0000000580)='sysfs\x00', &(0x7f00000005c0)='sysfs\x00']) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 04:37:59 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x4000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 369.650621][T12218] EXT4-fs warning (device sda1): ext4_group_extend:1782: can't shrink FS - resize aborted [ 369.677880][T12240] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x7, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) linkat(r2, &(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000080)='./file0\x00', 0x1000) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r5, 0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x0, r5, 0x0}]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r6, r6) ioctl$sock_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000000c0)) io_cancel(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 04:37:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f0000000140)=0x1, 0x4) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0xb, &(0x7f0000000080)=""/96, &(0x7f0000000100)=0x60) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:37:59 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup3(r0, r0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r1, 0xc01864ba, &(0x7f0000000000)={0x8001, 0x3, 0x63, 0xcccccccc}) dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200000000400200) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r4, 0x29, 0x19, &(0x7f0000b67000), &(0x7f00000000c0)=0xffffffffffffff2f) 04:37:59 executing program 3: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0xfffffffffffffffc, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0xe12a) fchmod(0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7b, 0x1}, 0x7) sendto$inet(r1, 0x0, 0x0, 0x200007fd, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x500, 0x0) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/238, &(0x7f0000000240)=0xee) r4 = dup2(0xffffffffffffffff, r3) dup3(r4, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="74e7d5bf5355d9f5f01e5b8ebfc0000ffc33c18df8c7085060767043ce0d92abbb0fb8d4312bfcf2e2d269", 0x2b, 0x4091, &(0x7f00000002c0)={0x2, 0x4e21, @rand_addr=0x64010102}, 0x10) unshare(0x40000000) open(0x0, 0x0, 0x0) 04:37:59 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x4203, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 369.884229][T12261] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:37:59 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x40002, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)={0x80000000}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f00002f9000/0x1000)=nil, 0x1000, 0x5, 0x13, r0, 0xe4637000) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 370.015814][T12272] IPVS: ftp: loaded support on port[0] = 21 [ 370.076504][T12289] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 370.095395][T12296] IPVS: ftp: loaded support on port[0] = 21 [ 370.107488][T12289] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 370.132422][ T2780] tipc: TX() has been purged, node left! 04:38:00 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) stat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000200)) setfsuid(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469302c776f766d89b8723d2e2f66696c65315c000000000000000000"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 04:38:00 executing program 1: timer_create(0x0, &(0x7f0000000000)={0x0, 0x16, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_delete(r0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000080)=0x9) prlimit64(0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@multicast1, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80, 0x33}, {0x0, 0x9, 0x9, 0x0, 0x0, 0x3f}, {}, 0x0, 0x0, 0x2}, {{@in=@dev, 0x0, 0x3c}, 0x0, @in6=@mcast1, 0x3503, 0x2}}, 0xe8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000002c0)=ANY=[@ANYBLOB="5f8a30ead195170224c99db0d368b5890bcd28c63f48b3a8ff06a24a2ba5a743b1147c5e4293a2000000000000000788e90bae5a16ad772cda5674875f6eb3c53bfc5d04ff5e217667b041eb13d59912278c146dcb32a1db9dc60b6c453264f4a994b419ea30"]) getegid() r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x28, &(0x7f00000001c0)}, 0x10) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)}, 0x10) fcntl$setstatus(r1, 0x4, 0x2000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 04:38:00 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x4800, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x81}, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x0, 0x10000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x6b3cfdd0, 0x260000) ppoll(&(0x7f0000000300)=[{r2, 0x12}, {0xffffffffffffffff, 0x1040}, {}, {0xffffffffffffffff, 0x8}, {r2, 0x2000}, {r1, 0xc021}, {0xffffffffffffffff, 0x2440}, {r4, 0x406}, {r5, 0x410}], 0x9, &(0x7f0000000380)={0x0, 0x989680}, &(0x7f00000003c0), 0x8) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0400b20000000000"], 0x5}, 0x1, 0x0, 0x0, 0x20000805}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000004bc0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x24}}, 0x0) 04:38:00 executing program 4: r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/804], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r2, r2) readahead(r2, 0x3, 0xbe) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f00000000c0)=0x10001) ioctl$USBDEVFS_CONNECTINFO(r4, 0x40085511, &(0x7f0000000080)) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x58, r3, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xff}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xc2}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}, @L2TP_ATTR_MTU={0x6, 0x1c, 0xfa70}]}, 0x58}, 0x1, 0x0, 0x0, 0x40004000}, 0x4080080) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 370.299023][ T26] audit: type=1800 audit(1587789479.971:31): pid=12233 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16256 res=0 [ 370.307402][T12233] EXT4-fs warning (device sda1): ext4_group_extend:1782: can't shrink FS - resize aborted 04:38:00 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x4c00, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:00 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x66, 0x2) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000000c0)=0x6, &(0x7f0000000100)=0x4) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c8020000780100007801000078010000000000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c7400000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:00 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x6800, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:00 executing program 0: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000100000008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="16bed8fc", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000000000000002000000000000000"], 0x5c, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0xf61, 0x0, 0x0, "a51a896b2973717319f5670b91e4e4c8", "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"}, 0xf61, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x39, 0x0, 0x0, "a51a896b2973717319f5670b91e4e4c8", "c3bf0acbe4eb05180978f74ea1d4719da478ccdd04d323f9cf4e2c53448250a57b29a56d"}, 0x39, 0x0) [ 370.633095][T12346] overlayfs: unrecognized mount option "lowerdi0" or missing value [ 370.749487][T12353] overlayfs: unrecognized mount option "lowerdi0" or missing value 04:38:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f00000000c0)=""/165) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x5000000}, 0x1c) 04:38:00 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x6801, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) shmget$private(0x0, 0x1000, 0x1, &(0x7f0000ffe000/0x1000)=nil) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x80) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket(0x15, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) getsockopt(r3, 0x200000000114, 0x2710, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000080)) 04:38:00 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:00 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x6c00, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:00 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x37, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 04:38:00 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x1, 0x11, r4, 0x7) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r5 = gettid() process_vm_writev(r5, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) syz_open_procfs(r5, &(0x7f0000000040)='net/protocols\x00') [ 371.243525][T12386] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:01 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x7400, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 371.322403][T12386] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:01 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x24, r5, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_SCAN_SUPP_RATES={0x6, 0x11d, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x4}, @NL80211_BAND_5GHZ={0x5, 0x1, "a5"}]}]}, 0x24}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in=@multicast2, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @remote}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) accept$packet(r9, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000008c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000900)={@private1, 0x0}, &(0x7f0000000940)=0x14) sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f0000000a40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x58, r5, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r11}]}, 0x58}, 0x1, 0x0, 0x0, 0x4040001}, 0x4000094) write$cgroup_type(r1, &(0x7f0000001180)='threaded\x00', 0xfc9a) fallocate(r1, 0x3, 0x0, 0x2cbd) fallocate(r0, 0x3, 0x0, 0x2cbd) 04:38:01 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x3, &(0x7f0000b4a000)={0x0, 0x10000000, 0x0}, 0x0, 0x8, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SOUND_MIXER_WRITE_VOLUME(r3, 0xc0044d03, &(0x7f0000000080)=0x1a) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f00000000c0)={0x1, 0x2, 0x4, 0x10000, 0x2c1c10d9, {}, {0x0, 0x2, 0x81, 0x5, 0x1, 0x1f, "334f01f6"}, 0x10001, 0x2, @planes=&(0x7f0000000080)={0x0, 0x7, @userptr=0x2, 0x2}, 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 04:38:01 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x7a00, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 371.749930][T12405] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:01 executing program 0: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r3, r3) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000840)=ANY=[@ANYBLOB="500000001000050774740000dfdbdfa65501a381", @ANYRES32=0x0, @ANYRESDEC=r3, @ANYRES32, @ANYBLOB="630101c30340a59af4c3650421f9a5377986fc254ec2862883ce7257cd4f7ae2dcfdaef81c581d1b4223e49887ee68e87ed537d5b2e957e1fac165be3eb34c5174f6279277376cbe5d10966df793456b54921f664921e1615264cc762c189704152109b0dff9eb9ca92da732cc5b46ffffff7f025485dc560b67fa9950386e7d44374265b739aa0ef8288e45feb997445e598790400e81a0a90106099ffc4061064fb95e437e5d5f0594c091b75999c66551d206c48cab1b787530de3629da0b37b211578542ae70ac9e8c0dbe754a77abd06ce2420a63be0b9def5fa522a5ac76e5d1c851bc49ad7264baad72d6a0952ab461fbe34dc958b497f18b6b57a956e1336391815132c94ba68ec897ae8c862fd7919dedd0cf0d349ae66e7ba70eebd42bb920e571525ade2a40384cceca9c8b2ecd8cc99513185dcd5d49e4eaaa1b3432096056c2cc8f6f2729c4e636839365729dd9b3"], 0x5}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = dup(r4) r6 = socket$kcm(0x10, 0x2, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x100000421) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x1d8, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000005e000700000000000069aa0000000000", @ANYRES32=r7, @ANYBLOB="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"], 0x24}}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x60}, 0xc, &(0x7f0000000f40)={&(0x7f0000001040)={0x74c, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0x178, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xff}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xfffffffa}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0xfffffff7}}, {0x8}}}]}}, {{0x8}, {0x21c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xc03}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xc0}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x88b}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0xaa}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x400, 0x3, 0x7, 0x5}, {0x9, 0x44, 0xd0, 0x8}, {0x20, 0x7f, 0x65, 0x3}, {0x2, 0x0, 0x1, 0x3ff}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x20}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}]}}]}, 0x74c}, 0x1, 0x0, 0x0, 0x10}, 0x1) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000fc0)={0x44, r8, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x124, r8, 0x500, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}, @IPVS_CMD_ATTR_DAEMON={0x7c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'virt_wifi0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan1\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vxcan1\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x29}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2e}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x800}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 04:38:01 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$sock_bt_hci(r2, 0x400448df, &(0x7f0000000a40)="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") msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:01 executing program 0: r0 = dup(0xffffffffffffffff) getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_MSR_INDEX_LIST(r4, 0xc004ae02, &(0x7f0000000100)={0x2, [0x0, 0x0]}) connect$inet6(r2, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendmmsg(r2, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x4000000) 04:38:01 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./bus\x00') r1 = socket$kcm(0x10, 0x2, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r2, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {0x0, 0x4109}, {0x4c, 0x18, {0x114, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x400, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008800}, 0x800c800) 04:38:01 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xa801, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 372.032433][T12428] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:01 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:01 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129d00b}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f00) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="90cc9a8bd99d86f6bcd50181cb611db7f6ca046f9eb23c1511c3f921fb", 0x1d}], 0x1, &(0x7f00000004c0)=[{0x28, 0x110, 0x1, "37fc384498fd83510c58ca91042e9c91d147efe33be68d35"}, {0x40, 0x10b, 0x40, "c168dd619a1e209b07078e59134d8f54e17b92003e4336f8df6782d25671959082621ec8ab6cdc7de8fe93bffa9a42"}, {0x78, 0x118, 0x4, "4f28328add869169dbbbbf1cbb186e2bd226b63d0274dbb8a47c628235b16809d3dcfcca6fccfe827dde14407dd563f590e72e657923e9db31a7fe1aa49e4df2a56e03b88afadaf1f56dfe07e15511c082e598545747dfbcc38e0a871b9d24546e31"}, {0x28, 0x10d, 0x3, "70608f8bb49ac756f20560e014cb835ec4ca1fb0"}, {0x48, 0xff, 0x12460db, "41718c4a3293725513126fce91c9facbe03e1de66b5ee62d37e198c2baa5ac2dbacd3bd26911202eed1c595bdbafe9834c4ddbf61b6e2a77"}, {0x38, 0x116, 0x6e7c70de, "8ece3b48d81ecc0694a62b368c5371319c7d06b02b2fdfd1add763376179f2a27643c3"}, {0xa0, 0x114, 0x1ff, "53706dd62a254770d0800846ed2b5588840b25de72e83618372ba0755faa376161527edd0dd8ce357556722cb7b0b2d91c725fbb464d2b2de6b4c0561eac28121c75a8b6e0be179745d42c84780747b6a323e08c0e7a9a430bb6e7d3a6aac1c9ea6bc2202a936cd797df26999dd471fdb6d6a3da2df9bf84c6f2ca9d8f812bbc0600ffe20539f5569d128dac8da195cb"}], 0x228}, 0x0) 04:38:01 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xb101, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 372.233177][T12433] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:38:02 executing program 1: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000001fe8)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000280)={0x10}, 0x10) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x200000b, 0x12, r0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40046f41, 0x76006e) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76006e) socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x2, &(0x7f00000002c0)=ANY=[@ANYBLOB="d7bbd34e705d6559f44d139b560e02298aa5349e3500faf1e27b19196ed5d70132830bcd91f8eee6c0567eb7f70b094dc27aab78ed1784fd126a4230acddef2506736d6c93a7f67d5cc91eda153276e45c0a062567e71800d305c62e3acd7b1f8b3bb4f3b7991df0c79361779b1775873709857156306a5f32a663dc186d686113d7c6ce7a291a1c", @ANYRES32=0x41424344], 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000000)={0x11, 0x4, 0x7, 0x9, 0x7f, "d96e960cb074d9eb9162c73f473f171204f48e", 0x6e, 0x23b3}) ioctl$FS_IOC_GETFLAGS(r0, 0x40086602, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000000380)) setsockopt$ALG_SET_AEAD_AUTHSIZE(r4, 0x117, 0x5, 0x0, 0xffff) [ 372.383956][T12445] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:02 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000000080)={0xffffffffffffffff, 0x40, "b49197", 0x9, 0x7f}) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xd000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:02 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='systemem0md\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\x9b\xab#/\xb4.\xae\xfc \xf6\xe8\b\x9bK\xf2\xd7\x993\xb5\tE\xd9E\xdfA\xdd\xf4\xea\xd9\b\t\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90\xd5\xc8\x1c\xa0\xe5\xf5S\xec\xc9\x96\x928gH\xd8\xa9\x8d\x1dp|qk\xbc\xcc\xbb\"\xd7_$F2\xc9\xe8\"\x17\x99\xaf\xf4[{\xe6@P\xf0\xa6\x1bB\x12\xf2\xdaA\x19\x8f\xfb\xaa\xc0\xd2\xf67\x93\xbfZ\x1a\xae4\x05\xff\xb6v\xd3O\xd1\xd9\xd4\x03M\x98\xa3\xe1\x17I|L\xe3\xda\xf8\xe7P\xaf\xce\x02\x0e\xaa\x83\xb2\xc4\r~.\xbd\x8f\x9c\x84\xb8T*\x84\x0f\x1d\x99\x1b\xb7\x9ah\x1dLD\xcb\xfa~\xb7u\x10Y\x96\xb5+\xfcSj\xd8w\x06\x18+\b\xda\x1a\xec\x9a\a\xfe\x0f\xa1\x90\xb4M\xbd\x80\x9a\x87n\xd7\x86I\xcc_E\xe2\x9c\x956b\xb6\x9c\xa2\xa4\xf41\x95L\t\xe1\x15D\xecp\xb1\x91\xe9SBo\xfa:\xa0\xde\x86D\xd8\x9d\x8eV8\xf5^\n5\xd3\xb0\xd7\xdb\xb5\x86\x10,\xe6\xf6\xabV\x8a\xa0\xd1\x90\t=\x00 [7\xd5mMg\f\xf9\xfd!\xd2\xfa\xab\f', 0x5) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x8, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) fcntl$setstatus(r1, 0x4, 0x102800) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000380)=0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept4(r6, 0x0, &(0x7f0000000080), 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r7, r7) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) r8 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup3(r2, r0, 0x0) 04:38:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x20000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x30000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x3) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:02 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000880200000000000000000000f8000000f8000000f8000000f0010000f0010000f0010000f0010000f0010000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000048000000009800f8000000000000000000000000000000000000000000280061646472747970650000000000000000000000000000000000000000000100000000000000006000534554000000000000000000000000000000000000000000000000000000ffff000000000000000000000000000000000000000000000000000000000000ffff000004000000050000000000000000000000000000000000000000000000ac1414bb7f00000100000000000000000000000000000000000000000000000073797a5f74756e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f80000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) mmap$snddsp_control(&(0x7f0000ffc000/0x2000)=nil, 0x1000, 0x2000000, 0x10010, r3, 0x83000000) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)={0x14, r7, 0x0, 0x0, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x200020d0}, 0x40000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/zoneinfo\x00', 0x0, 0x0) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x800) tkill(r4, 0x33) 04:38:02 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0xa0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000040)={{0x5, 0xea}, 'port0\x00', 0x10, 0x120001, 0x1f, 0x1, 0x0, 0xfffffffe, 0x1000, 0x0, 0x5, 0x9}) close(r0) [ 373.000138][T12496] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING 04:38:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="b423029b5755d170987830e22c4ec82017a1d002db3fdb9e56680025e9ea3f7bbd617e5156c0fb733dbe353c987fa1dd197681f50bb06ee72ed43e6d22cdb087b60ab56fd5cbe34d0bd23fc8582784240f03425501e2681c92c53258a48590525779b0eedabbdcc01fb9f344eccdc101b60fa2d84254a9bdb75a5b520ab65f3dc2dcf74d183be7464f49d03658c6a87dee044baff0a75f589fd80c78ac4e51943a82084a"], 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) socket$nl_xfrm(0x10, 0x3, 0x6) 04:38:02 executing program 3: setsockopt(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="500000000102010800000000000000490f0000003c0001802c00018014000300000000d088935e0a277f40000000002b10b32000ff0200000000000000000000000000010c000280040001000000000041160788bb9dcc3b3d2043304e501f83"], 0x50}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r1, r1) write$binfmt_elf64(r1, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x5, 0x98, 0x80, 0xffff, 0x2, 0x0, 0x9, 0x15f, 0x40, 0x3b5, 0x1, 0x9, 0x38, 0x1, 0x9, 0x3, 0x3}, [{0x6, 0x0, 0x4, 0x9, 0xfab, 0x6b6, 0x5, 0x6}], "6f9d1bc3ec6a8bd68120eb2206fcf78dffdf8c82b9a3bd70ff04f8396339f1cefad623efe13affe80aa7c111c2975fe1d4f2fc1b95934b8f8dbce7c02d34d63f63975eafbdc30fa9f5c38e9c6490b14f4e9f267fa13ec3b251998e9d93abcd1444b61d034a7317ea421ab815a75f276cf987d54103d0bee36e5d021c9e8a1d6a0245b1fba8c25f32e0cfc0ae85366d47f3c79c48bc5f9712f6bb1b1a107c3fa7d051bd492bd139d7fbdfe01dc0a5c55f1f1d95d8a24b6cf05f6127e07c51d7f1115e442f1aa5e89224c85506018f5994b9ca", [[]]}, 0x24a) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x3, 0x2, 0x3, 0x0, 0x0, {}, [""]}, 0x14}}, 0x0) 04:38:02 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a0272bdc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) read(r1, &(0x7f0000000080)=""/165, 0xa5) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:02 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0xc2, 0x97) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000000)="1c1d623889f5bbeb7446a2d5a76fa52246124f4802c682d34aac8e", 0x1b, 0x3}, {&(0x7f0000000180)="5c1109aadcbd405efd11d90292adeb33d8a9bd72164fda677dd4340c395f9477756748e7ed91fe81594e9feb73a006c9f270d5dd755afe6a0c5f785f40ef8e38b3faab07511264f8843c5cc44e0539123beab13def35d12f3f6bad61f3ff9abb7e8dfeb8c1f1360b87dc6b0021c66c43f7ff91354b5decbf19d64c2acd4abd998ce3673105835ac3aff330667c2917f627cc6ce0be62f5b1131d5b5292e0576bbe323976843fbed6b84a9f5e552e6c0e7ced0cc32d3632d169baca9911d075f27d40ae11d88d57af6348fe12f6", 0xcd, 0x7}], 0x20802, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 04:38:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x31728, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x7ffffffd, @loopback}, {0x2, 0x0, 0xffffffff, @ipv4={[], [], @loopback}}, r2}}, 0x48) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket(0x11, 0x800000003, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xff04) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r3, 0x0, r6, r4}, 0xb8fb, 0x0, 0x0, 0x8000}) r7 = getuid() stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket(0x11, 0x800000003, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xff04) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r8, 0x0, r11, r9, 0x0, 0x2}, 0xb8f9, 0x0, 0x0, 0x8000}) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x3, &(0x7f0000000300)=[{&(0x7f0000000180)="95c80a7ac5cfd6c243091aa803c8cf2c633e3564ebe06412a01494df4f5f662bc6417aaaef19ee4e9cbf0aeec3fb0e73e1e11fd5b738dc9df852bc8be694faf7bee2fa7093310a440c3bdf5ec99877e8176d", 0x52, 0x4}, {&(0x7f0000000200)="65a8d7af0e79a1d582ded1587ba398f815d713a3fd21805c407953870e954f18252db7be428e9c258e997b8960208eba8616", 0x32, 0x100000001}, {&(0x7f0000000240)="17754e28364c79dbe5252dfd0d1403571648789fb6e76a1fdde8da0164ec38be842b8266e061fb1f985c753f85d0e7554bd0c9e9179ad22c1f9fcdc425eadfa804612fa103fe1665c02942d0d5fce92b5aa3660e221297012b6e5c18380532a022a7409927e24ec5c48964fe071e90f48edfdae51f2b5a96d69ac650049de8ecc73e16a264614375c72bc92b266d6e0756797e89fe08ea0628ece8fde0713823b67df8286a81c0cf", 0xa8, 0x9}], 0xa2000, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r3, @ANYBLOB=',cruft,sbsector=0x0000000000000005,dmode=0x0000000000000000,check=strict,session=0x000000000000005a,block=0x0000000000000000,check=relaxed,func=FILE_CHECK,uid<', @ANYRESDEC=r7, @ANYBLOB='\b\x00\x00\x00\x00\x00\t\x00', @ANYRESDEC=r11, @ANYBLOB=',permit_directio,seclabel,fowner=', @ANYRESDEC, @ANYBLOB=',rootcontext=staff_u,\x00']) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x7}, 0x4}, r2}}, 0x30) r12 = socket$inet6(0xa, 0x80003, 0x6b) setsockopt$IP6T_SO_SET_REPLACE(r12, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x460, 0x280, 0x280, 0x0, 0x0, 0x0, 0x390, 0x350, 0x350, 0x390, 0x350, 0x7fffffe, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x280, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x105, 0xa6}}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x3, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c0) [ 373.213732][ T2780] tipc: TX() has been purged, node left! 04:38:03 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x38000, 0x0) recvfrom$netrom(r1, &(0x7f00000000c0)=""/38, 0x26, 0x60, &(0x7f0000000100)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x9003000000000000, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="7261774a010000228b667e63d8c8fcca96ff000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d00000000acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)={0x2, 0x2}, 0xc) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5, 0x100011, r0, 0xd718b000) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x28440, 0x0) getdents(r3, &(0x7f0000000a40)=""/4096, 0x1000) [ 373.290811][T12517] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 373.321321][T12517] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 373.348501][T12517] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 04:38:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x40000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 373.487095][T12540] ptrace attach of ""[12533] was attempted by "/root/syz-executor.2"[12540] 04:38:03 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x32, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) sysfs$2(0x2, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r0, r3, 0x80000) dup2(r5, r4) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r5, 0xc04c5349, &(0x7f0000000180)={0x6, 0x400, 0x80}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSERGETLSR(r6, 0x5459, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) dup(0xffffffffffffffff) 04:38:03 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000240)="898e3a4eb243e820ebca68fdc71c5e89", 0x10) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f00000000c0)=0x20008, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000380)={0x42b503f5, 0x7fffffff}) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x3a, &(0x7f00000002c0)=[{&(0x7f0000000280)="fe", 0xfdc3}], 0x1, 0x0, 0x0, 0x10}, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 04:38:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x100000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:03 executing program 0: exit_group(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="d400000010003b0e00"/18, @ANYRES32=0x0, @ANYBLOB="030000000000000008000a00", @ANYRES32=0x6, @ANYBLOB="ac0012000800010067726500a000020008000700e00000010500170000000000060003003f000000060011004e24000005001600020000000500170000000000050008000000000008000600ac14141908000700e000000108005edb311f06000000000008000700ffffffdf080005000000000006000e000001000006001100000000000500170000000000", @ANYRES32, @ANYBLOB="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"], 0xd4}}, 0x0) r0 = socket(0x10, 0x8000000000000003, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000000)) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) 04:38:03 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000080)={0xb95, 0x3, 0x0, 0xa5, 0x33, "3478e36f900c9093154c7d2a227e19b15c5700", 0xd3, 0x80}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x27, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') r4 = gettid() process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) sched_getparam(r4, &(0x7f00000000c0)) 04:38:03 executing program 1: sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, 0x0, 0x4001800) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, &(0x7f0000000680)={0x0, 0x0, 0x6, 0x0, 0x5}) migrate_pages(0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) sched_rr_get_interval(r1, &(0x7f0000000080)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100), 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000004c0)=""/227) mount(&(0x7f00000006c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) 04:38:03 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x208001, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000100)={0xa30000, 0x4, 0xfff, r4, 0x0, &(0x7f00000000c0)={0x9a0900, 0xfffffffa, [], @ptr=0x61c3}}) 04:38:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x1000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:03 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(r0, 0xc02064a5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x10, 0x2, 0x10) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000300)={0x9c0000, 0xffff, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000240)={0x990966, 0x9, [], @string=&(0x7f0000000200)}}) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000340)=""/150) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000fc0)={0x44, r5, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x84, r5, 0xd00, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xd}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x4}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xb}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x43}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x84}, 0x1, 0x0, 0x0, 0x20000000}, 0x11) 04:38:03 executing program 0: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_STEREO(r2, 0xc0045003, &(0x7f0000000100)) r3 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f0000000040)=0x101, 0x4) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 04:38:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x2000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:03 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0x3a) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f0000000080)={0x6, 'bond_slave_1\x00', {0x4642}, 0xe000}) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000140)={0xa10000, 0x4, 0x80, r0, 0x0, &(0x7f0000000100)={0x990964, 0x7, [], @string=&(0x7f0000000080)=0xfc}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8)={r2}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000002c0)=ANY=[@ANYRES32=r2, @ANYBLOB="0900e6001e5476c2df8210d1e60c7a4c2ef77e48c50a35358ddcdc56a59c2f1de272b6d1be1c4bfb2ccccaa5a7073f9269b38264bfaeaceb2afb6cdefbb996f29277b91bd4b285a152f327232b3e9c8b9bb3ac79d78b38f4ec5f29944356a8323a9dd8478918d34d8a7e325e0e307c7835f427de2c7ac42eded025984c30ce8249728be68b77590b841dd24b6e3d1f2737b8714d727097b42368e2cb077afcaed7d211ee6b62a7b834f1b3473c251a0bfe3de272d099370d2cc4077f99b1875508534699872456800d4de662f3043b6901d5e852f57bbd4edd8af3509a304ffa6ebda86a4345b08da2bf"], 0xee) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) sendto$inet6(r3, &(0x7f0000000200)='\n', 0xfffffdef, 0x40080, 0x0, 0x1f4) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000002680)='/dev/sequencer2\x00', 0x2c8002, 0x0) r5 = socket(0x200000000000011, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f00000001c0)={0x4, 0x4, 0x7, 0x0, 'syz0\x00'}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r7}, 0x14) getsockname$packet(r5, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x100000421) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x1d8, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000fd5d0007000000000000294f4000000000", @ANYRES32=r8, @ANYBLOB="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"], 0x24}}, 0x0) connect$can_j1939(r4, &(0x7f00000026c0)={0x1d, r8, 0x1, {0x1, 0x1, 0x3}, 0x1}, 0x18) 04:38:04 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000240)="898e3a4eb243e820ebca68fdc71c5e89", 0x10) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f00000000c0)=0x20008, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000380)={0x42b503f5, 0x7fffffff}) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x3a, &(0x7f00000002c0)=[{&(0x7f0000000280)="fe", 0xfdc3}], 0x1, 0x0, 0x0, 0x10}, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 04:38:04 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x3000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:04 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) r2 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dri/renderD128\x00', 0x400, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:04 executing program 0: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000240)="898e3a4eb243e820ebca68fdc71c5e89", 0x10) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f00000000c0)=0x20008, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000380)={0x42b503f5, 0x7fffffff}) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x3a, &(0x7f00000002c0)=[{&(0x7f0000000280)="fe", 0xfdc3}], 0x1, 0x0, 0x0, 0x10}, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) [ 374.652650][T12620] rpfilter_check: 7 callbacks suppressed [ 374.652659][T12620] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="dec6cb660ff3d7c4e209cf33660f3881a80008ea121ad700f3d9f6b849000f00d0b87d008ed80f01d8"}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000040)={0x0, 0x11d000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.advise\x00', &(0x7f00000001c0)=""/162, 0xa2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000440)={{0x0, 0x0, 0x80}, "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", "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"}) 04:38:06 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b000000000000000061b404867894188b00000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x4000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:06 executing program 0: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000240)="898e3a4eb243e820ebca68fdc71c5e89", 0x10) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x66, &(0x7f00000000c0)=0x20008, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000380)={0x42b503f5, 0x7fffffff}) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r2, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r2, &(0x7f0000000100)={0x0, 0x3a, &(0x7f00000002c0)=[{&(0x7f0000000280)="fe", 0xfdc3}], 0x1, 0x0, 0x0, 0x10}, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 04:38:06 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) r1 = socket$packet(0x11, 0x3, 0x300) write$binfmt_script(r1, &(0x7f0000000180)={'#! ', './file0', [{0x20, '.'}], 0xa, "890e17ebfdad2d5482e886b46f3986094ae8db1f9f639020ac6d08a46fda0c2328c0efe8722239cd3877cb95174298e922297b04f034fd0e384d72e7c86ea031a99303ce7cb0e675e1a51259e69f5e390750222218d8d2daf0b056896a27be995fe2dc84682329372870433c09af47ef8839d7dc856e5bd85b5bcf0e74174bc9f4006be796877f678488c918dcd37996d45da0a2fbad3c076ff2f9a7f07ed2fe51053f4621dbb3521e245d3225508b96bdebf3f07d8379f665326d0677e944123d881f6af0c4ab425259314d315e49d071851a9e0ed44635f2cd11ad64a47611153c5d735ba98222e38ff99bf49ba401"}, 0xfd) sendmmsg(0xffffffffffffffff, &(0x7f0000008640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$xdp(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)}, 0x4008001) 04:38:07 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 377.339338][T12668] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x5000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x6000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 377.503682][T12681] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:07 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x100010, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 377.723129][T12701] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:07 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000001180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200000, 0x0) 04:38:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x7000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 377.779898][T12701] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:07 executing program 4: r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000fc0)={0x44, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r3, 0x200, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x40440c5}, 0x4080) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x8030000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 377.918962][T12717] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:07 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c802000078010000780100007801000000000000780100003002000030020000300200003002000030020000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005801780100000000000200000000000000000082d4a211a9584f5c38780000000000c000737472696e670000000000000000000000000000009ec4eff85bb6000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b00000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000000000000000000000004e9abdcac3064e5e36f8b2a47ca66376bb292f3e7f0340d34d049842ba5ab48a85c30dd3a19383732e2705f4f003eeaf0463c04bfaed498b2c92081b66dca7c8884996def0e06be5240c5b2984efec299fad83261401ad0abc24321ee3f154e67bab0bd367446761f9c9925f9f39e3ebeb58526f5ff0e4b4e88af52489a3f80b934cfdec5532302a2924652850e341749501b5b72bdacf797e0724e3c3e5ff1c0aba5e44f9a8b1c113148f5f647f5bc34aea4c713dc02e0334cc9e48103a8362786a2ab402b077272167f40f3e7f95d5f54a"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v2={0x2000000, [{0x72}, {0xb4a, 0x9}]}, 0x14, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sysfs$2(0x2, 0x80, &(0x7f00000000c0)=""/116) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000050000104000000000000000e00000000b6ea5832bfde34bb107fa45a1dbb93ab0c377ecb6ad920edb3a84a60a89f818628df7de402057ca30f28b5c376efa3950800dc47833f9c4fb7d7a7b418be0b082c5a64052589b9926cc5cd7fa3cfc601776b30f7230d681d2797bb7714d7db7d54d3e692dc11a4bd26c1f1d7bdc748a10b616bcaad33988892b77f80714079face2c1d77eadcde81413fcbed9224bb7e070b38d6c43811930168550796f8a0e70578b651327b2115d1790dfb280d6b1089ccf025711ce3397e7aabbc77a05e631fad559e844bdb084c5c", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800a000100767863616e0000000400028008000300", @ANYRES32=0x0, @ANYBLOB], 0x3c}}, 0x0) 04:38:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='vlan0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000280)={0x0, 0x0, r5}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 04:38:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000340)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0xf, 0x0, 0xfe, 0x57, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x3800) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2000000000012, 0x7, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) dup2(0xffffffffffffffff, r2) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, r1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400006) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="0100e0ef69aa7799a6948203d2e892602d63e732392f74bd52c40001a69fa57cc1b1f73b78b721ba22a3c775221eb4cd15f1c72167bd23befe43f69575ae00000000000000000000000000000000000017000000000000", @ANYRES16=r4, @ANYBLOB="90002cbd7000fbdbdf25040000000500010001705c120000fd140002002e000000000000000000000040cd806635dddfc2d1000001080005000000000008"], 0x3}, 0x1, 0x0, 0x0, 0x4004080}, 0x20000054) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000002200)={&(0x7f00000020c0), 0xc, &(0x7f00000021c0)={&(0x7f0000002100)=ANY=[@ANYRES16=r4, @ANYBLOB="00012cdf250800000014000300fc01000000000000000000000000000114000200fc020000000000000000000000000007007379737465c357d1b0a5bbd30463745f723a7373685f6b65797369676e5f657865635f743a73300014000600627269646765300000000000000000000500e0ff000000001400030080000000000000000000ffff64010100050001000000000000"], 0x2}, 0x1, 0x0, 0x0, 0x81}, 0x8000800) write$cgroup_int(r3, &(0x7f0000000200), 0x806000) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) r5 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 04:38:07 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="7261774a0100000000000000000000000000000000000000000000000000000002000000037f974b000000c8020000780100007801000078010000000000007801000030020000300200003002000030020000300200000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0b414bc680000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004fede9d84b87fcf37"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x440, 0xc4) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xa000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:08 executing program 4: clone(0xba202600, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000000140)={0x0, 0x50000001, 0x0}, 0x0, 0x8, &(0x7f0000000000)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/105) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='vlan0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000280)={0x0, 0x0, r5}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 04:38:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x16020000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 378.515258][T12750] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:08 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xa02600, 0x0) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f00000000c0)={&(0x7f00008e3000/0x2000)=nil, 0x7, 0x3, 0x4b, &(0x7f0000ffb000/0x3000)=nil, 0xfffffeff}) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x20000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='vlan0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000280)={0x0, 0x0, r5}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 04:38:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) syz_open_procfs(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000000380)={&(0x7f0000000140), 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x20000004}, 0x10) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000280)={r3, 0x2}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f00000000c0)={r3, 0x1}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 378.746412][T12766] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:08 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='vlan0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000280)={0x0, 0x0, r5}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 04:38:08 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x2008002) sendfile(r0, r1, 0x0, 0x200fff) fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket(0x11, 0x800000003, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xff04) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, 0x0, 0x0, r4, r2}, 0xb8fb, 0x0, 0x0, 0x8000}) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket(0x11, 0x800000003, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xff04) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5, 0x0, r8, r6}, 0xb8fb, 0x0, 0x0, 0x8000}) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x3}, [{0x2, 0x6}, {0x2, 0x4}, {0x2, 0x3, 0xee00}, {0x2, 0x4}, {0x2, 0x2}, {}, {0x2, 0x7}], {0x4, 0x7}, [{0x8, 0x6, r6}], {}, {0x20, 0x765d28d81de9cb9d}}, 0x64, 0x2) 04:38:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x20030000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:08 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x100, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000400)={0x4}) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000440)={0x101ff, 0x2, 0x2, 0x2000, &(0x7f00002ca000/0x2000)=nil}) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:08 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_INTERRUPT(r3, 0x4004ae86, &(0x7f00000000c0)=0xa108) close(r2) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, 0x0) ftruncate(r5, 0x200004) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendfile(r2, r5, 0x0, 0x80001d00c0d0) 04:38:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='vlan0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000280)={0x0, 0x0, r4}) 04:38:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x28170300, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:08 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r4 = clone3(&(0x7f0000000340)={0x64000080, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x2d}, &(0x7f0000000140)=""/183, 0xb7, &(0x7f0000000200)=""/255, &(0x7f0000000300)=[r2, 0xffffffffffffffff, r3], 0x3}, 0x50) syz_open_procfs(r4, &(0x7f0000000040)='net/protocols\x00') 04:38:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x2f090000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 379.308716][T12796] overlayfs: filesystem on './file0' not supported as upperdir [ 379.325058][T12813] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x38030000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000480)='vlan0\x00', 0x10) 04:38:09 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000120000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:09 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfff, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r1, r1) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000000)={0x2, 'geneve1\x00', {0x401}, 0x50}) 04:38:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x40000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 379.526563][T12827] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x42030000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 379.757457][T12843] Scaler: ================= START STATUS ================= [ 379.789416][T12843] Scaler: ================== END STATUS ================== [ 379.825753][T12843] Scaler: ================= START STATUS ================= [ 379.851727][T12843] Scaler: ================== END STATUS ================== 04:38:11 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x2) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x11, 0x800000003, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xff04) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, 0x0, r5, r3}, 0xb8fb, 0x0, 0x0, 0x8000}) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040)='9p\x00', 0x205020, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@smackfsdef={'smackfsdef', 0x3d, 'defcontext'}}, {@dont_measure='dont_measure'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '9p\x00'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@euid_eq={'euid', 0x3d, r2}}, {@subj_role={'subj_role', 0x3d, '},'}}, {@context={'context', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'root'}}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) 04:38:11 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0xaca4c000) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip_vs_stats\x00') getsockopt$inet_dccp_buf(r3, 0x21, 0xf, &(0x7f0000000100)=""/185, &(0x7f00000001c0)=0xb9) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x1, 0x0) connect$bt_sco(r4, &(0x7f00000000c0)={0x1f, @none}, 0x8) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', 0xfffffffffffffffe, 0x0, 0x2) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_TRANSLATE(r5, 0xc018ae85, &(0x7f0000000380)={0xf000, 0xf000, 0x4, 0x5, 0x8}) ioctl$USBDEVFS_BULK(r4, 0xc0185502, &(0x7f0000000300)={{{0xe, 0x1}}, 0x8f, 0xc, &(0x7f0000000240)="53d1ab704beb71bd83b554aef9711cd46469a9b3f4aa23ec1ba554a66e95a3113e4106f88c610c855ff1a2bff788c01dde48eff4118de55c0a3371d3c18b9c397a314dffa3d6c42194e2caf32a7bc09acf1682a9d55354821163c10c4043b8078348122571865ad2202786b2f2c9dd2a15c1e5ef608e8956b7205e9f4f32051baf00c9be6e232e512eb8b6e80ae2f3"}) setsockopt$inet_mreqsrc(r4, 0x0, 0x28, &(0x7f0000000200)={@rand_addr=0x64010100, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) 04:38:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x48000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r3, r3) 04:38:11 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7f0) mknod(0x0, 0x0, 0x0) open(0x0, 0x420002, 0x39) dup(0xffffffffffffffff) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x380, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x604c2, 0x10f) write$P9_RREADLINK(r1, &(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESOCT, @ANYRES64, @ANYRES16], @ANYRESDEC, @ANYRES64, @ANYRESDEC=0x0], 0x38) sendfile(r2, r2, &(0x7f0000000040)=0x499, 0x8080ffff7ffd) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xb, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000), 0x188) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x3200c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffe27) connect$inet(0xffffffffffffffff, 0x0, 0x5b) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @remote}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x6, 0x4000000000000000, 0x3f}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r1, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r4, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0xa0400, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYRES16=0x0], 0x2) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000240)=@gcm_128={{0x304}, "4fda82d24438e8b0", "2dcdae9cca3f9f0f2a2f74fbf1dff658", "0c27a46a", "ac091ba1b9a20680"}, 0x28) 04:38:11 executing program 2: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) r0 = syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup2(r1, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x402800, 0x0) ioctl$DRM_IOCTL_SG_FREE(r6, 0x40106439, &(0x7f0000000000)) dup2(r0, r4) accept$alg(0xffffffffffffffff, 0x0, 0x0) 04:38:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x4c000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 381.626337][T12866] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:11 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[], 0x0) msgctl$IPC_INFO(0x0, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) 04:38:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x341d43, 0x81) r3 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0xc0142, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000000)=[0x7, 0x0, 0x6, 0x0, 0x3ff, 0x20, 0x4, 0x83], 0x8, 0x180000, 0x0, r3}) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) ftruncate(r2, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r0, r2, 0x0, 0x80001d00c0d0) ioctl$RTC_UIE_OFF(r2, 0x7004) socket$unix(0x1, 0x2, 0x0) 04:38:11 executing program 3: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000000)={0x4, [[0x595d91c9, 0x7, 0x9, 0x20, 0x10001, 0x2, 0x7, 0x5], [0x2, 0x6, 0x4, 0x5, 0x7, 0x9, 0x7927, 0xffffffc0], [0x2, 0x20, 0x2, 0x3, 0x26, 0xfff, 0x800, 0x80000001]], [], [{0x8b, 0x8, 0x1}, {0x18d8, 0x0, 0x0, 0x1, 0x1, 0x1}, {0x6}, {0x1, 0x4, 0x1, 0x1, 0x1}, {0x2, 0x4, 0x1, 0x0, 0x0, 0x1}, {0xc99a, 0x10000, 0x0, 0x1, 0x1, 0x1}, {0x5, 0xfff, 0x1, 0x1, 0x1, 0x1}, {0x6, 0x8, 0x0, 0x1}, {0x6c1, 0xc7c, 0x1, 0x1, 0x1}, {0x6, 0x3, 0x0, 0x1, 0x1, 0x1}, {0x7, 0x0, 0x1}, {0x19, 0x10000, 0x0, 0x0, 0x1, 0x1}], [], 0x6}) sendmsg$nl_route(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000840)=@mpls_getnetconf={0x14, 0x1a, 0x1}, 0x14}}, 0x0) [ 381.813681][T12868] IPVS: ftp: loaded support on port[0] = 21 04:38:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x68000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:11 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0xa280) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_PREPARE(r3, 0x4140, 0x0) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000080)="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") r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x381042, 0x0) ioctl$SIOCAX25ADDFWD(r4, 0x89ea, &(0x7f0000000440)={@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) syz_init_net_socket$ax25(0x3, 0x3, 0x1) 04:38:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 04:38:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x68010000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:11 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="7261774a010000000000000000000000000000000000000000000000000000000200000003000000c80200007801000078010000780100000000000078010000300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000580178010000000000000000000000000000000000000000c000737472696e67000000000000000000000000000000000000000000000001000000006b6d7000000000000000000000000000f9d9e63590ab5471c46924e95540949f0cd7e2b0a94d71d9d944acb7f0a1297674a95b30cee19db4c1725572ba928385b1635c89b58ae9a0e1ea500b26f006da3fa8a134552f7980e92de5a784cd4f46e799e191835d7d5ea776f04bef524e22f0bb6ed4b00f44ceb936943e13fa1caa6b4b159c673db1efa9a08b1ddc74ce6c4702000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000076002e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800b80000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f00000000c0)={0x2, 0x1, 0x3}) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) socket(0x27, 0x6, 0x7fff) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') [ 382.302861][T12927] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 382.399912][T12879] IPVS: ftp: loaded support on port[0] = 21 [ 382.411078][ T8105] tipc: TX() has been purged, node left! 04:38:13 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket(0x1e, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VFIO_CHECK_EXTENSION(r3, 0x3b65, 0x4) sendmsg(r1, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x457d10) 04:38:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x6c000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r1, r1) 04:38:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r4, r4) fchmod(r4, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$CAN_RAW_FD_FRAMES(r3, 0x65, 0x5, &(0x7f0000000080), 0x4) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f0000000140)) syz_genetlink_get_family_id$smc(0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$netlink_NETLINK_RX_RING(r6, 0x10e, 0x6, &(0x7f0000000000)={0x7fff, 0x401, 0x9, 0x200}, 0x10) 04:38:13 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r2, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESOCT=r2, @ANYRES16=0x0, @ANYRES32=r4, @ANYRES32=r0], @ANYRES64=r6]], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="696fffffff7f000000006d61636963656c6500642c696f6362af6861727365743d6d61636963656c616e644296864c8312a97d0d36444c01ea46388615aebc9961cd5151fd7501e79388227981ce86ada3d2afddfe0a775c076c8f1669c296fd7af3df6d0dea5805d666e86a5c7f5f1860405238600ebb3758b59ff28ce896706cefde7565bf764e96"]) 04:38:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x74000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:13 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0xd5, "a3fb9f0db401f7f2b15efa85208218de6b9cfa94a84c996bc1da0c328ec745f1d47413700ed124dd92420bb694c37aea629ddf7ada4d8258abc167eb28e57fa73cec9773ef9970d561786e980d05ff57d7758931485cfe5f1962bac6fb27104043ffac91e24dc06763f5c52c05d8b9a3d6d0d298ca375f7b8ddd2e37b2ae6a2b486f07106e3a1f692535446eae869467fb558b84883e9eb749abf21dfc662cda5c21629932373214388826c0449e8ea3c89cb9f863f56c24361adc5bebea972df41bd1122f24794875ad7bfb7c27bb109498234d48"}, &(0x7f0000000180)=0xdd) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000001c0)={r6, 0xfffffffd}, &(0x7f0000000200)=0x8) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(0xffffffffffffffff, 0xc008551b, &(0x7f0000000240)={0x6, 0x4, [0x7]}) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) 04:38:13 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2175e5693eda0c52, 0x8031, 0xffffffffffffffff, 0xffffc000) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xd1, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000180)={0x0, 0x1}, 0xc) [ 383.988322][T13013] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' 04:38:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) [ 384.077835][T13019] IPVS: ftp: loaded support on port[0] = 21 04:38:13 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r0) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@md5={0x1, "89df35023ae66553d74e9915f2d669dc"}, 0x11, 0x1) r3 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x9003000000000000, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) msgctl$IPC_INFO(0x0, 0x3, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000100)={0x8, 0x4, {0x0}, {}, 0x80, 0x7}) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0xd3140, 0x0) r8 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/attr/current\x00', 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r3, &(0x7f0000000380)={r7, r8, 0x3}) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f00000003c0)=ANY=[@ANYBLOB="e00000000000000005000000000000000500000000000000800000000000000000000080000000000904060900000000000000000000000000000000000000000000000000000000000000000000000000000100000000000956ac4b0000000027000000000000000726e083000000000000000000000000000000000000000000000000000000000000000000ea00000000000000000000ffffff7fffffdfff07000000000000000307ff2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000020000de0e000000000000db00052d000000000000000000000000000000000000000000000000000000000000000000000000ffff00000000000002000000000000000400000002000000040002fe00"/336]) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x7a000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00'}) socket$inet6(0xa, 0x2, 0xff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) r3 = socket(0x200000000000011, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r5}, 0x14) getsockname$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x100000421) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x1d8, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000005e000700000000000069aa0000000000", @ANYRES32=r6, @ANYBLOB="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"], 0x24}}, 0x0) r7 = socket(0x200000000000011, 0x3, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x0, r9}, 0x14) getsockname$packet(r7, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x100000421) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x1d8, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000005e000700000000000069aa0000000000", @ANYRES32=r10, @ANYBLOB="4c439ea0b0079c050000000000000d00000000b8a2622061f0c22b241af631fdeed5c71372f78bfaddee58c3376bfac81d7eea7df100333d216a69648d12b792f4e3b6f093b7b35926de250c29ca14566f026848ecdedea47639ecb1853a8f5a8ad92e5d201d1f1dc10eca6fc5897e3a89ee851aabaa60bb81bda844c42b1ec776915ae1716a35cbfb24f630cf8b910bf9a8169393008a64ebc2f938f6a318697bd3b5553c7127ee20244ffe4a362ac3104d2c3f7799e86b83366dbe7e534065be52b5009d15305130721087bd56f92bea33865b182f5bdc8ea00d2071fd9b38d9afda963d5db043cc6bc6da4db5a12034dd00ffadc9d4ca0318e7c6b2a6eb0f53e21a9de1ea84d99378b1603c53db8ec538e65246bb1302a291a9c8bfac8c020749ac428b05a09074619b709b0621c436b7a0623e7a5cda69bb6d38de1bce33ff395d07991829d0c37af45cfbac7b8ed93ee57af201847aa033e023dd"], 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x118, 0x0, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0x94, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x7, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4040801}, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'veth1_to_team\x00', 0x800}) 04:38:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f00000002c0)="c96e6c7d2cb29cc9124a67cabb5a6840d976683353aa32c7058ccc36b2c3b864a780cf894007048e44ed29d380604bf2bc8689e6ceac3d587a216766b7371d918eb0ea09296564626c12e7c88517997a653ede2a5de8f9515a31018e4fa4e7b0fd176ea5d44d9eb922f29f32ca8d4aa5c4ecdbe28bf1e2585c18ff5fd5173eea58a86960b7a29ceb4a4e74c8272a8027716e4d31a3b636157bf7dfa9a3f49f9b29078d802555779fe7341d383b2b3c5d0ae493c91099714f20c1a583943e", 0xbe}, {&(0x7f0000000080)="d2aa995e234cca45f3138c41446412", 0xf}, {&(0x7f0000000200)="238e3215a8bbc1f09b861da851b5e873f88f909abe547b847914faba47e0a8c0a0cb6ac95c6456b3396c52f6355bc260f69279f426b8f7054670420fdd7760e2780d1bc787e77eccf1dff63e3baa3a4f24fc62321570847772bfe660622285cf92cbbbfd90ed94d9d155c497b50eb9c2bdf519deb65f1126", 0x78}, {&(0x7f0000000380)="6a72fbc0a108658fa2115ad67cc2be3b826287da9caf4bbfd4313d818bff3083bfd4fd12d23006ecc785724a3c628fbcacfbcc935031f5c16352fcc304bb2132bf2b44", 0x43}, {&(0x7f0000000400)="79ccb5874e476231a6ba83f6418b504843e6d4b931ca67e3bc2e56c0c5cfa520445af1e80a40a9bd601c0d76da1d1f20ab2a6835ece5940f870c4b332a863c3d44cf5b175afd67998fe51377de9f5c8581f0a575d418c98cdf4535bfbad4a6e19ba27f96bd8971c408", 0x69}, {&(0x7f0000000640)="c7aec1c8803165ad2bd2240614011eff7f0000519e1608d34febad16c1e9fb06ee5cd9596d3f75afe5e75f272742ebd1058f4adf00ee35857fb5afe6dc8119b0386e3ded09e739da3488c869256f05b6ee8b7bae1dbe7fadea436e9be1dcbb4192b6ed5cf79767554be882893f3227b47f2e5b62269628140a538c92ef5e347c7724234b0beb255f67ce349b28a04c6d73815990bd2257b6e29c78512df000", 0x9f}, {&(0x7f0000000500)="41c00134e0673ecdbb0158b45bc2a0371c277c5bd8ef0ef0597d87dabd09b83dc2e9e86655cc9b13370a7a0c729b1dbcc2dbae6882567a1fde331add74642abcf33ec34ddc2fda43cede2e229a350fe8484035e83420b5ad303d382feb3258b787a3de54d83375796ee31414dbaa72734aaac1d162b5ffab118e83c54eec446927c6f7a4dc94e6f3dfe0baa666cec68ec40f0d84e52bd1003bb805216cb4c16c817fe15fc64854cc37124267cbdac2adf044dcd53e5b77d2628858f4", 0xbc}], 0x7) [ 384.887129][T13019] IPVS: ftp: loaded support on port[0] = 21 [ 385.017095][ T2780] tipc: TX() has been purged, node left! 04:38:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r4, r4) fchmod(r4, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$CAN_RAW_FD_FRAMES(r3, 0x65, 0x5, &(0x7f0000000080), 0x4) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f0000000140)) syz_genetlink_get_family_id$smc(0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$netlink_NETLINK_RX_RING(r6, 0x10e, 0x6, &(0x7f0000000000)={0x7fff, 0x401, 0x9, 0x200}, 0x10) 04:38:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x80ffffff, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x0) 04:38:14 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r2 = getpid() ptrace$getregs(0xc, r2, 0x9, &(0x7f00000003c0)=""/33) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:14 executing program 2: r0 = creat(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) io_setup(0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt(r1, 0x8, 0x0, &(0x7f00000002c0)=""/230, &(0x7f00000003c0)=0xe6) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fsopen(&(0x7f0000000000)='gfs2\x00', 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xf0ffffff, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd, r4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, &(0x7f0000000240)={{0x5c, @empty, 0x4e21, 0x1, 'lc\x00', 0x12, 0x0, 0x42}, {@local, 0x4e20, 0x2, 0x1f, 0x6, 0x2}}, 0x44) 04:38:14 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xa8010000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) 04:38:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="fc", 0x1, 0x20000009, &(0x7f00000010c0)={0xa, 0x2, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet6(r0, &(0x7f0000000080)=""/4096, 0x1000, 0x2, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000001080)="aa", 0x1, 0x1, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400, 0x0) sendto$l2tp(r3, &(0x7f00000011c0)="a6ca69f19254d0ed04e23d178263da17d2b958f1bcf8095b94e36d949ace09198a378f910026ea450ae9fa3c7e35166796faaa99e4a78ff49973eaa8965d5a992f07468a0bb59b1eb9965076a2d734e837f5028e4784e57f36c4277db840b7ab04655084d9681ff67711f29a04118b029c9f67231bd6f4cae19c2e754141114ec8f9ad3125ff421844a029425cc9e16ee33599ee1d4346d5608c61746481641d227be59616979966ccd591f1cdcce72e6431e9fc7ab7e56304c2faa2deacde662d8665c75c9317d9f3abd8385b300cb77e695f5a3146a5a8f621b4cdf3df142ad9", 0xe1, 0xc021, &(0x7f0000001100)={0x2, 0x0, @remote, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000010680)=[{{0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000001180)='p', 0x1}], 0x1}}], 0x1, 0x0) [ 385.384107][T13109] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 385.411765][T13120] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 385.505937][T13109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 385.529554][T13109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:38:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) 04:38:15 executing program 4: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000980)='systemem0md5sum$\x003\xb2/s\x81\x16u\x86\xe6\xa6\xcbB\xdd\xed\x93\xcf\b\x0eH\x98E\\\x94b\xd5y\x97\xd7\x993\xb5\tE\xd9E\xee\xd2EX\xa9\x80\xec\x13\xeeJ\xe0\xe91\xee\xcf]\x86\xcb\xd9$v\x9e\xe7\x16\xb0\xa0\xae\x98\xd5r\x17\xb5\xee\xa8\x9b\xb7,,\xcb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb68\xd4U\x11\a^,v\xd4#\xe34+:\xd4\xe6\x10;\x03\xd7_\x98r\xc1\xa44\'\xd0\x8b\xa9f\xcf?\x05\x90', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x9003000000000000, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) msgctl$IPC_INFO(0x0, 0x3, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2c, r5, 0x5, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x60}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd97}]}, 0x2c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r5, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x40c0014) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 04:38:15 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) [ 385.997199][T13118] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 386.011253][T13139] ipt_rpfilter: only valid in 'raw' or 'mangle' table, not 'rawJ' [ 386.074993][T13118] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 386.123160][T13118] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:38:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340), 0x0) ftruncate(r0, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r4, r4) fchmod(r4, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$CAN_RAW_FD_FRAMES(r3, 0x65, 0x5, &(0x7f0000000080), 0x4) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f0000000140)) syz_genetlink_get_family_id$smc(0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$netlink_NETLINK_RX_RING(r6, 0x10e, 0x6, &(0x7f0000000000)={0x7fff, 0x401, 0x9, 0x200}, 0x10) 04:38:16 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xb1010000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:16 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000001000011800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000014001680100001800c0007000000000000000000"], 0x3c}}, 0x0) socket(0x10, 0x803, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x180, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f00000002c0)={0x2}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f32f00fb30f0f309a0900000065002ed8ddc74424008f6dc4bd8787442402c43a727fc7442406000000000f35f30f090f013a360f06c4c18d72d683b9070200000f32ed", 0xbfc7713255079c2d}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_PORT_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, 0x0}, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) pipe2(&(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000002f000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:38:16 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) 04:38:16 executing program 2: r0 = creat(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) io_setup(0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt(r1, 0x8, 0x0, &(0x7f00000002c0)=""/230, &(0x7f00000003c0)=0xe6) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fsopen(&(0x7f0000000000)='gfs2\x00', 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xf0ffffff, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd, r4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, &(0x7f0000000240)={{0x5c, @empty, 0x4e21, 0x1, 'lc\x00', 0x12, 0x0, 0x42}, {@local, 0x4e20, 0x2, 0x1f, 0x6, 0x2}}, 0x44) 04:38:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RNDGETENTCNT(r4, 0x80045200, &(0x7f0000000440)) r5 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x284) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000280)={0x0, 0x0, [0x5, 0x2, 0x6, 0x3, 0x7, 0x4cd16976, 0xb8000000, 0x9]}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x100, 0x7ffffffd, @loopback}, {0x2, 0x0, 0xffffffff, @ipv4={[], [], @private=0xa010101}}, r6, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x34, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8001}, r6}}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x11b, 0xb8, &(0x7f0000000480)="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", &(0x7f0000000140)=""/184, 0x7, 0x0, 0x9d, 0x1000, &(0x7f0000000340)="2d7ff21646fd8753bd0e49c8286828160f662eb7f6b4b717b4d7363e2ec3e4db05a7d03d039c64e6f4caf7efe01b1b225200304818784d3cf989d87f31952fcbfb0bd39a749052b567a700420b79f6c5935d90233f9b994330012cab04242cdc1a495fb57c842d67e09efc6c6fea18f428eb8b399301596abd735d282b476dd0710d19d7e274e87ca3366727209a8e69cf3710cf6d0245b6f8b546e769", &(0x7f00000018c0)="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"}, 0x40) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000880)=ANY=[@ANYBLOB="40eaf774", @ANYRES16=r8, @ANYBLOB="011c000000000000000005000000180001801400020073797a5f74756e00000000000000000014000380100003800c0001800600020079000000"], 0x40}}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000400)={'veth1_vlan\x00', {0x2, 0x4e24, @local}}) [ 386.807914][T13162] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 04:38:16 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) [ 387.075759][T13164] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:38:16 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) [ 387.211923][T13164] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 387.245091][T13164] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 387.343702][T13168] kvm [13157]: vcpu0, guest rIP: 0xcb ignored wrmsr: 0x11e data 0xbe702111 04:38:17 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) 04:38:17 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) [ 387.750954][T13185] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 04:38:17 executing program 2: r0 = creat(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) io_setup(0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth1_to_hsr\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt(r1, 0x8, 0x0, &(0x7f00000002c0)=""/230, &(0x7f00000003c0)=0xe6) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fsopen(&(0x7f0000000000)='gfs2\x00', 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xf0ffffff, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd, r4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, &(0x7f0000000240)={{0x5c, @empty, 0x4e21, 0x1, 'lc\x00', 0x12, 0x0, 0x42}, {@local, 0x4e20, 0x2, 0x1f, 0x6, 0x2}}, 0x44) 04:38:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xd0000000, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 388.150731][T13206] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 388.254667][T13206] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 388.278008][T13206] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:38:18 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x1ff, @local}, 0x1c) listen(r0, 0x5eb05a) socket$inet_dccp(0x2, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=@gettaction={0xa8, 0x32, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x3c, 0x1, [{0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x14, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xffc0000}}]}, @action_gd=@TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x18, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x80000001}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x460094a5}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x9}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x4}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000}, 0x20040004) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @private=0xa010101}, 0x10) syz_emit_ethernet(0x5e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaabb0000000000009100060001000000000d000000202a020003cfffee61974a9e519fe9e56439c292a20db356cdbd375da1dc1e2c9c7e69d908715ca6c8a2cdc82e54c6512648378791047ea003a63e18bedc5373f74671560000"], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = accept4(r4, 0x0, 0x0, 0x40c00) recvmmsg(0xffffffffffffffff, &(0x7f0000002e80)=[{{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000680)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001780)=""/125, 0x7d}], 0x3}, 0xfffffffc}], 0x1, 0x400000c0, &(0x7f0000003000)={0x0, 0x989680}) sendmmsg(r5, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 04:38:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) 04:38:18 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0xc0080, 0x0) getsockname$ax25(r0, &(0x7f00000000c0)={{0x3, @bcast}, [@bcast, @netrom, @remote, @netrom, @rose, @null, @netrom, @netrom]}, &(0x7f0000000140)=0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="0293a97cd9226c3d374d16897147a98935734a8ced6d960e12f561da444d936e274af6f08bd9e21bdd1573d8cebd3246749490da3a544a527c543ded644c40344ded2b6ce1c2934039632e840ca5919054c4c203ce", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x6c, &(0x7f000059aff8)={r5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000200)={r5, 0x43b}, &(0x7f0000000280)=0x8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r7, r7) close(r7) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f00000001c0)=0x6, 0x4) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) 04:38:18 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_GSO_MAX_SEGS={0x8}]}, 0x30}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket(0x11, 0x800000003, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xff04) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r3, 0x0, r6, r4}, 0xb8fb, 0x0, 0x0, 0x8000}) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket(0x11, 0x800000003, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xff04) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r7, 0x0, r10, r8}, 0xb8fb, 0x0, 0x0, 0x8000}) keyctl$chown(0x4, 0x0, r3, r8) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 04:38:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) 04:38:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) 04:38:18 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xfdffffff, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:18 executing program 2: mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x382048c, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup2(r0, r2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x7f, 0x4, 0x9, 0x5, 0x0, 0x9, 0x804, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0x5, 0xfffffffffffffffe}, 0x408, 0x7fff, 0xd7b, 0x5, 0x1f, 0x9ecd, 0x6f95}) [ 388.816307][T13229] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:38:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24048000, 0x0, 0x0) [ 388.882003][T13229] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 388.916800][T13229] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 04:38:18 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xfeffffff, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24048000, 0x0, 0x0) 04:38:18 executing program 1: modify_ldt$write2(0x11, 0x0, 0x0) pipe(0x0) perf_event_open(&(0x7f0000000080)={0x2, 0xffffffffffffff14, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000540)) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000800)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x7) write$sndseq(r0, &(0x7f0000000080)=[{0x10081, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0x1c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r1, 0xc2604111, &(0x7f0000000840)={0x1, [[0xf0000000, 0x6, 0x7549, 0x5, 0x2, 0x8, 0x1, 0x10001], [0x1, 0x101, 0x5, 0x40, 0x9, 0xffff, 0xa69e, 0x3f], [0x4, 0x9, 0x1f, 0x80000000, 0x5, 0x7, 0x8, 0x8]], [], [{0x2, 0xfffffffe, 0x1, 0x1}, {0x0, 0x8001, 0x0, 0x1, 0x1}, {0x3, 0xffff8001, 0x1, 0x0, 0x1, 0x1}, {0xff, 0xffffffff, 0x0, 0x1, 0x1, 0x1}, {0xffffffff, 0xfffffff9}, {0x9, 0xfffff800, 0x0, 0x1}, {0x6, 0x40, 0x1}, {0x2, 0x6, 0x1, 0x1, 0x1, 0x1}, {0x4, 0xffff, 0x1, 0x1}, {0x2, 0x2b, 0x1, 0x1}, {0xfffffffa, 0x7, 0x0, 0x1}, {0x9, 0x9, 0x0, 0x0, 0x1, 0x1}], [], 0x100}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000540)) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000006c0)={0xc, @pix={0x0, 0x9, 0x30324c4a, 0x3, 0xfffff744, 0x200, 0x0, 0x7fff, 0x1, 0x4, 0x1, 0x6}}) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000100)={@local}, &(0x7f0000000140)=0x14) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f00000001c0)={0x80fb}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x4000000) getsockname$packet(r3, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="500000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="be210000270807001c0012800c000100766163766c616e000c00028008000100080000000a000500040000000000000008000a000f2dda303525d107e11cb91b3cc9ee6140f459ada0c280c4036eb7db8aba7d8cb030f0d5b564f037fdadd9f7a3335701c26754920f14fd720410ec0d26863c603eaa61f3ad577e4b26f67b5e4c02da6c2896bfe64378a86c801ef1c53ceff6ef55e2f4c66a2059cff198abc34452b07741567fa8632af351f3846dca56f994884dfab33e423229d961f3d32dca0a52d510cdf9edcce922de021b67e21c524f1ff8d64d97f13e61ac54323f2d5ee01e601826409c9e62af1ea77bd417824a6c", @ANYRES32=r4, @ANYBLOB], 0x50}}, 0x0) [ 389.054395][T13229] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 389.096898][T13229] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 389.128239][T13229] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 389.224347][T13275] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 04:38:19 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="894eaa1de47c58ee37b200450b7a89f0665139720dcd357a87c154e1aa6c8759e793d85f12633759616600058709b32b14a94629b50500000000000000000000000000c7d9151577127999814e5a6f7b1750932e5e2d74c6164fb1aff295315df8ffffffffffffff00c18dffa2744ab753d44faafdaebc750896"], 0x0, 0x7a}, 0x20) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r1 = openat$full(0xffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff], 0xcfff, 0x41400}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e20, @loopback}], 0x10) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x4, r5}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, 0x0, 0x0) 04:38:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0xffffd000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x3, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400204) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$netlink(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x20, r10, 0xb03, 0x0, 0x0, {0x13}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x4}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_NET_GET(r8, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="a0100000880ee26182528abc1b212e412e875a7482f6293aa34db151bea3b161089a5a06d68e578456889d417d000000000000000084f41f08760bed19db8d7ce3c2879bce040b7cd1", @ANYRES16=r10, @ANYBLOB="200028bd7000fedbdf250e0000000c0002800800020080ffffff380001800d0001007564703a73797a31000000001c000280080004000700000008000200f7ffffff08000400000000000800030002000000bc00058007000100696200002c00028008000200020000000800020002000000080001000b00000008000100130000000800040001040000080001006574680007000100696200001400028008000400008000000800030000020000080001006574680014000280080001001100000008000100140000003c0002800800040009000000080002000100000008000100130000000800020000000000080001001b00000008000200010001000800020000040000080001006574680034000980080001000900000008000100ffffff7f0800010053c25d1508000100ed04000008000100faffffff0800010001010000580004803c000780080002000000000008000200fffbffff08000200090000000800040005000000080001001d000000080002000800000008000400070000000900010073797a31000000000900010073797a3000000000"], 0x1a0}, 0x1, 0x0, 0x0, 0x10}, 0x4800) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0100000000000000000011000000"], 0x3}, 0x1, 0xa00000000000000, 0x0, 0x2000c060}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 04:38:19 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xffffff80, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24048000, 0x0, 0x0) 04:38:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)='4', 0x1}], 0x1) gettid() setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f0000000280)=""/102400, 0x19000}], 0x1, &(0x7f0000c22fa0), 0x10000000000001fd, 0x0) 04:38:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x100000421) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x1d8, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000005e000700000000000069aa0000000000", @ANYRES32=r2, @ANYBLOB="4c439ea0b0079c050000000000000d00000000b8a2622061f0c22b241af631fdeed5c71372f78bfaddee58c3376bfac81d7eea7df100333d216a69648d12b792f4e3b6f093b7b35926de250c29ca14566f026848ecdedea47639ecb1853a8f5a8ad92e5d201d1f1dc10eca6fc5897e3a89ee851aabaa60bb81bda844c42b1ec776915ae1716a35cbfb24f630cf8b910bf9a8169393008a64ebc2f938f6a318697bd3b5553c7127ee20244ffe4a362ac3104d2c3f7799e86b83366dbe7e534065be52b5009d15305130721087bd56f92bea33865b182f5bdc8ea00d2071fd9b38d9afda963d5db043cc6bc6da4db5a12034dd00ffadc9d4ca0318e7c6b2a6eb0f53e21a9de1ea84d99378b1603c53db8ec538e65246bb1302a291a9c8bfac8c020749ac428b05a09074619b709b0621c436b7a0623e7a5cda69bb6d38de1bce33ff395d07991829d0c37af45cfbac7b8ed93ee57af201847aa033e023dd"], 0x24}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_mreq(r4, 0x29, 0x14, &(0x7f0000000140)={@private2}, &(0x7f0000000180)=0x14) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)={0x60, 0x0, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x9, 0x13, "64f08e319a"}, @NL80211_ATTR_STA_SUPPORTED_RATES={0x1b, 0x13, "3c6c6781f4282aab1455fd14b213d20e5cf81af17cbf32"}, @NL80211_ATTR_STA_SUPPORTED_RATES={0x24, 0x13, "eccf9e000068cc524c1267b3e2c84ffba48dba5c1560ad51562cc0fee14c6139"}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x85) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="4c00000030002707000000ff0300000000000000380001938a3b7c91e739a600d4509e5c6374000024000280180001000000000000000000000000000000020000000000060003003800000004000600"], 0x4c}}, 0x0) sendfile(r9, r8, 0x0, 0x100000001) 04:38:19 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xfffffffd, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 389.397447][ T2780] tipc: TX() has been purged, node left! 04:38:19 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) [ 389.588940][ T26] audit: type=1804 audit(1587789499.262:32): pid=13292 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir350077572/syzkaller.bDdGY9/92/cgroup.controllers" dev="sda1" ino=16367 res=1 [ 389.670885][T13306] FAULT_INJECTION: forcing a failure. [ 389.670885][T13306] name failslab, interval 1, probability 0, space 0, times 0 [ 389.718509][T13306] CPU: 0 PID: 13306 Comm: syz-executor.0 Not tainted 5.7.0-rc1-syzkaller #0 [ 389.727210][T13306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.737260][T13306] Call Trace: [ 389.740562][T13306] dump_stack+0x11d/0x187 [ 389.744930][T13306] should_fail.cold+0x5/0xf [ 389.749445][T13306] __should_failslab+0x82/0xb0 [ 389.754231][T13306] should_failslab+0x5/0xf [ 389.758668][T13306] kmem_cache_alloc_trace+0x26/0x5f0 [ 389.763983][T13306] ? terminate_walk+0x1b8/0x240 [ 389.768838][T13306] tcp_sendmsg_locked+0x18bb/0x20f0 [ 389.774040][T13306] ? __rcu_read_unlock+0x77/0x390 [ 389.779067][T13306] ? __rcu_read_unlock+0x77/0x390 [ 389.784092][T13306] ? aa_label_sk_perm+0x7e/0xd0 [ 389.788992][T13306] ? aa_sk_perm+0x1cd/0x590 [ 389.793499][T13306] ? tomoyo_socket_sendmsg_permission+0xb1/0x212 [ 389.799846][T13306] ? __this_cpu_preempt_check+0x3c/0x130 [ 389.805509][T13306] tcp_sendmsg+0x35/0x50 [ 389.809760][T13306] inet6_sendmsg+0x69/0x90 [ 389.815260][T13306] ? inet6_ioctl+0x130/0x130 [ 389.819872][T13306] sock_sendmsg+0x98/0xc0 [ 389.824206][T13306] __sys_sendto+0x1e2/0x2c0 [ 389.828930][T13306] ? __this_cpu_preempt_check+0x3c/0x130 [ 389.834588][T13306] ? vfs_write+0x10b/0x380 [ 389.839003][T13306] ? fput_many+0xe2/0x130 [ 389.843337][T13306] ? fput+0x20/0x30 [ 389.847148][T13306] __x64_sys_sendto+0x7e/0xa0 [ 389.851827][T13306] do_syscall_64+0xc7/0x3b0 [ 389.856331][T13306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 389.862213][T13306] RIP: 0033:0x45c829 [ 389.866114][T13306] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 389.885721][T13306] RSP: 002b:00007f7c32ee8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 389.894160][T13306] RAX: ffffffffffffffda RBX: 0000000000500d00 RCX: 000000000045c829 [ 389.902125][T13306] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 389.910171][T13306] RBP: 000000000078bf00 R08: 00000000200001c0 R09: 000000000000001c 04:38:19 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0xfffffffe, 0x200, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:19 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="894eaa1de47c58ee37b200450b7a89f0665139720dcd357a87c154e1aa6c8759e793d85f12633759616600058709b32b14a94629b50500000000000000000000000000c7d9151577127999814e5a6f7b1750932e5e2d74c6164fb1aff295315df8ffffffffffffff00c18dffa2744ab753d44faafdaebc750896"], 0x0, 0x7a}, 0x20) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r1 = openat$full(0xffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000300)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff], 0xcfff, 0x41400}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e20, @loopback}], 0x10) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x4, r5}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, 0x0, 0x0) 04:38:19 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550d, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) symlinkat(&(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00') [ 389.918134][T13306] R10: 0000000024048000 R11: 0000000000000246 R12: 0000000000000004 [ 389.926210][T13306] R13: 0000000000000a09 R14: 00000000004ccbed R15: 00007f7c32ee96d4 04:38:19 executing program 3: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r0 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x7, 0x4, 0x0, 0x0, 0x0, 0x100000000, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000400), 0x1}, 0x9114, 0x0, 0x1, 0x6, 0x0, 0x4, 0x8001}, r0, 0x0, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xe2d4) getpid() ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0x8) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r3, 0x0, 0x8}, 0xc) socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x0, 0x8, 0x0, 0x41, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1000000, 0x3}, 0x40) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8936, &(0x7f0000000000)={r5}) recvmsg$kcm(r4, &(0x7f0000009280)={0x0, 0x0, &(0x7f0000009200)=[{&(0x7f0000007f00)=""/171, 0xab}, {&(0x7f0000007fc0)=""/89, 0x59}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000009040)=""/147, 0x93}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000001580)=""/176, 0xb0}], 0x6}, 0x10142) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002b80)={&(0x7f0000001800)=@ll={0x11, 0x2, 0x0, 0x1, 0x42, 0x6, @random="edad8cf9f21e"}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000001880)="ee2ca7ebefcea172f4b7e781a06e4f8a8c12db787868b0a2bb28d033bb9dbedfad1dc16f2ce092923038a0603b6fbc0f5b61e71681fced3ab81780b1bfbcced8c7c4cff7e6218e9ddef4ab713acb7a27a5c8978985932f5b56de64936d6467c702610c3f76fc475785ee65c46b96de98536d0d94c7f2393e04e248daa5a4b0c34d4f65c69821222749dd8f2cfa68eb4abf4dedfac1989989996786613a685afabe0df53d81e0eff2c6c80dc8c5cbb57728", 0xb1}, {&(0x7f0000001940)="7430240bc38e14fb66834a89301049d213c53a40fa1adb88ab57d454941c0f09a41033b4ae8edc8eb39d22970aba4278567d7cc11f6f270150efe8ca11fab9a6a30459a18c3a9536211f50f7eee8f5", 0x4f}, {&(0x7f0000000440)="651400ed05d183ac5d99afb4e229d240d536c71f84cb4c25bcc7922d17f4a2749502c019b592f430430351bff75cd5affa90cdc2e3b5c4d1eced62d9ffc959f52c56d90353583e9bc983957b239f8246364c10a972f0c31f6fa5", 0x5a}, {&(0x7f0000002bc0)="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", 0x1051}, {&(0x7f0000002a00)="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", 0xfd}], 0x5}, 0x40000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400c00) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpu.stat\x00', 0x7a05, 0x1700) r7 = socket$kcm(0x29, 0x3, 0x0) r8 = socket$kcm(0x11, 0x5, 0x300) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000100)={r8}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, 0x0) 04:38:19 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0xc7, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) 04:38:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r2) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x200240) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket(0x11, 0x800000003, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r4, 0x0, r7, r5}, 0xb8fb, 0x0, 0x0, 0x8000}) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket(0x11, 0x800000003, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xff04) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r8, 0x0, r11, r9}, 0xb8fb, 0x0, 0x0, 0x8000}) fchown(r3, r7, r9) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) writev(r1, &(0x7f00000005c0)=[{&(0x7f0000000000)='~', 0x1}], 0x1) 04:38:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000580)="5500000018007f02fcfe05b2a4a280930a060001fe80000214000000390009002d6850000600000019000540029b84136ef75afb83de441100ae20ca3ab8225405060cec4fab91d471cd34938c42f030dd941e7931", 0x55}], 0x1}, 0x80) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x48000, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 04:38:19 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$tipc(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x1e0, 0x209, 0x3d8, 0x0, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) [ 390.242116][T13328] xt_hashlimit: overflow, try lower: 0/0 [ 390.337240][T13339] xt_hashlimit: overflow, try lower: 0/0 [ 390.518037][T13290] ================================================================== [ 390.526260][T13290] BUG: KCSAN: data-race in shmem_add_to_page_cache / shmem_recalc_inode [ 390.534640][T13290] [ 390.536948][T13290] write to 0xffff88803aa30e08 of 8 bytes by task 13284 on cpu 1: [ 390.544648][T13290] shmem_add_to_page_cache+0x4b0/0x6c0 [ 390.550082][T13290] shmem_getpage_gfp+0x43f/0x1520 [ 390.555079][T13290] shmem_fault+0x117/0x4b0 [ 390.559486][T13290] __do_fault+0xa8/0x1e0 [ 390.563739][T13290] __handle_mm_fault+0x24d9/0x2ec0 [ 390.568834][T13290] handle_mm_fault+0x21c/0x540 [ 390.573570][T13290] __get_user_pages+0x533/0x11c0 [ 390.578503][T13290] __get_user_pages_remote+0x164/0x590 [ 390.583934][T13290] pin_user_pages_remote+0x71/0xb0 [ 390.589054][T13290] process_vm_rw_core.isra.0+0x34d/0x760 [ 390.594671][T13290] process_vm_rw+0x1c4/0x1e0 [ 390.599237][T13290] __x64_sys_process_vm_writev+0x80/0xa0 [ 390.604845][T13290] do_syscall_64+0xc7/0x3b0 [ 390.609323][T13290] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 390.615189][T13290] [ 390.617506][T13290] read to 0xffff88803aa30e08 of 8 bytes by task 13290 on cpu 0: [ 390.625118][T13290] shmem_recalc_inode+0x50/0x180 [ 390.630064][T13290] shmem_getpage_gfp+0x5ca/0x1520 [ 390.635075][T13290] shmem_fault+0x117/0x4b0 [ 390.639479][T13290] __do_fault+0xa8/0x1e0 [ 390.643698][T13290] __handle_mm_fault+0x2679/0x2ec0 [ 390.648786][T13290] handle_mm_fault+0x21c/0x540 [ 390.653540][T13290] __get_user_pages+0x533/0x11c0 [ 390.658630][T13290] populate_vma_page_range+0xdc/0x100 [ 390.663975][T13290] __mm_populate+0x168/0x2b0 [ 390.668552][T13290] vm_mmap_pgoff+0x185/0x190 [ 390.673129][T13290] ksys_mmap_pgoff+0x96/0x420 [ 390.677782][T13290] do_syscall_64+0xc7/0x3b0 [ 390.682262][T13290] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 390.688130][T13290] [ 390.690429][T13290] Reported by Kernel Concurrency Sanitizer on: [ 390.696567][T13290] CPU: 0 PID: 13290 Comm: syz-executor.2 Not tainted 5.7.0-rc1-syzkaller #0 [ 390.705211][T13290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.715253][T13290] ================================================================== [ 390.723295][T13290] Kernel panic - not syncing: panic_on_warn set ... [ 390.729867][T13290] CPU: 0 PID: 13290 Comm: syz-executor.2 Not tainted 5.7.0-rc1-syzkaller #0 [ 390.738508][T13290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.748545][T13290] Call Trace: [ 390.751814][T13290] dump_stack+0x11d/0x187 [ 390.756119][T13290] panic+0x210/0x640 [ 390.760174][T13290] ? vprintk_func+0x89/0x13a [ 390.764743][T13290] kcsan_report.cold+0xc/0x1a [ 390.769399][T13290] kcsan_setup_watchpoint+0x3fb/0x440 [ 390.774748][T13290] shmem_recalc_inode+0x50/0x180 [ 390.779663][T13290] shmem_getpage_gfp+0x5ca/0x1520 [ 390.784668][T13290] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 390.790623][T13290] shmem_fault+0x117/0x4b0 [ 390.795018][T13290] ? __do_fault+0x86/0x1e0 [ 390.799420][T13290] __do_fault+0xa8/0x1e0 [ 390.803641][T13290] __handle_mm_fault+0x2679/0x2ec0 [ 390.808735][T13290] handle_mm_fault+0x21c/0x540 [ 390.813489][T13290] __get_user_pages+0x533/0x11c0 [ 390.818423][T13290] populate_vma_page_range+0xdc/0x100 [ 390.823777][T13290] __mm_populate+0x168/0x2b0 [ 390.828606][T13290] vm_mmap_pgoff+0x185/0x190 [ 390.833176][T13290] ksys_mmap_pgoff+0x96/0x420 [ 390.837830][T13290] ? debug_smp_processor_id+0x3f/0x129 [ 390.843267][T13290] do_syscall_64+0xc7/0x3b0 [ 390.847758][T13290] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 390.853631][T13290] RIP: 0033:0x45c829 [ 390.857533][T13290] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 390.877121][T13290] RSP: 002b:00007fb4b5cd5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 390.885506][T13290] RAX: ffffffffffffffda RBX: 00000000004f58c0 RCX: 000000000045c829 [ 390.893583][T13290] RDX: 0000000000000003 RSI: 0000000000b36000 RDI: 0000000020000000 [ 390.901543][T13290] RBP: 000000000078bfa0 R08: ffffffffffffffff R09: 0000000000000000 [ 390.909489][T13290] R10: 0000000000008031 R11: 0000000000000246 R12: 00000000ffffffff [ 390.917437][T13290] R13: 0000000000000738 R14: 00000000004c9f80 R15: 00007fb4b5cd66d4 [ 392.031283][T13290] Shutting down cpus with NMI [ 392.037569][T13290] Kernel Offset: disabled [ 392.041901][T13290] Rebooting in 86400 seconds..