0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000180)="0dbd6a09c18f39fed6b6c1e19a5a36a99895118bb762591a695bc6d34eb661655228353efc0b4a8a126a27f5018fb99537d453beef246f73d7b0351a61d2c7531068fafcf92915e9479839e88d599927dacd6538dfb3bceea9a048a73b1078cc3d4bbabe36a0874d0a27b29c12b3def6d204d3794aea2dbbd795359b8b8ae46d608ab6e7c7e11d2f4b0efbe5aa911fe750664bed20b4209d8a0667ff6d92a89cff46f863b6b7e9b8924abe3cfb1062510f7496e2a404bbe14fd41cb071de5a022c437428b36132925f5395dc90189bbdab9640daf16ec96780fa3f8816c5a2a9f0ba8f688c1e6fa53465ed5cfab9575d14bc8e", 0x0}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(r2, &(0x7f00000007c0)) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)) getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x1, 0x1) 02:21:20 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x50000000, &(0x7f000000a000)) [ 2365.656578] kernel msg: ebtables bug: please report to author: bad policy [ 2365.670090] rpcbind: RPC call returned error 22 [ 2365.682304] rpcbind: RPC call returned error 22 [ 2365.702504] rpcbind: RPC call returned error 22 02:21:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) [ 2365.789406] rpcbind: RPC call returned error 22 02:21:20 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 02:21:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:20 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000180)="0dbd6a09c18f39fed6b6c1e19a5a36a99895118bb762591a695bc6d34eb661655228353efc0b4a8a126a27f5018fb99537d453beef246f73d7b0351a61d2c7531068fafcf92915e9479839e88d599927dacd6538dfb3bceea9a048a73b1078cc3d4bbabe36a0874d0a27b29c12b3def6d204d3794aea2dbbd795359b8b8ae46d608ab6e7c7e11d2f4b0efbe5aa911fe750664bed20b4209d8a0667ff6d92a89cff46f863b6b7e9b8924abe3cfb1062510f7496e2a404bbe14fd41cb071de5a022c437428b36132925f5395dc90189bbdab9640daf16ec96780fa3f8816c5a2a9f0ba8f688c1e6fa53465ed5cfab9575d14bc8e", 0x0}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(r2, &(0x7f00000007c0)) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)) getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x1, 0x1) 02:21:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) [ 2365.870155] rpcbind: RPC call returned error 22 [ 2365.885342] rpcbind: RPC call returned error 22 02:21:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:20 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x84000000, &(0x7f000000a000)) [ 2365.922502] rpcbind: RPC call returned error 22 [ 2365.936025] kernel msg: ebtables bug: please report to author: bad policy 02:21:20 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000180)="0dbd6a09c18f39fed6b6c1e19a5a36a99895118bb762591a695bc6d34eb661655228353efc0b4a8a126a27f5018fb99537d453beef246f73d7b0351a61d2c7531068fafcf92915e9479839e88d599927dacd6538dfb3bceea9a048a73b1078cc3d4bbabe36a0874d0a27b29c12b3def6d204d3794aea2dbbd795359b8b8ae46d608ab6e7c7e11d2f4b0efbe5aa911fe750664bed20b4209d8a0667ff6d92a89cff46f863b6b7e9b8924abe3cfb1062510f7496e2a404bbe14fd41cb071de5a022c437428b36132925f5395dc90189bbdab9640daf16ec96780fa3f8816c5a2a9f0ba8f688c1e6fa53465ed5cfab9575d14bc8e", 0x0}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(r2, &(0x7f00000007c0)) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)) getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="1000010000000000"], 0x1, 0x1) 02:21:20 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x60010000, &(0x7f000000a000)) 02:21:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2366.108264] rpcbind: RPC call returned error 22 02:21:20 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xde000000, &(0x7f000000a000)) 02:21:20 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000180)="0dbd6a09c18f39fed6b6c1e19a5a36a99895118bb762591a695bc6d34eb661655228353efc0b4a8a126a27f5018fb99537d453beef246f73d7b0351a61d2c7531068fafcf92915e9479839e88d599927dacd6538dfb3bceea9a048a73b1078cc3d4bbabe36a0874d0a27b29c12b3def6d204d3794aea2dbbd795359b8b8ae46d608ab6e7c7e11d2f4b0efbe5aa911fe750664bed20b4209d8a0667ff6d92a89cff46f863b6b7e9b8924abe3cfb1062510f7496e2a404bbe14fd41cb071de5a022c437428b36132925f5395dc90189bbdab9640daf16ec96780fa3f8816c5a2a9f0ba8f688c1e6fa53465ed5cfab9575d14bc8e", 0x0}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(r2, &(0x7f00000007c0)) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)) getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="100001000000000020000200"], 0x1, 0x1) [ 2366.138726] rpcbind: RPC call returned error 22 [ 2366.145376] rpcbind: RPC call returned error 22 [ 2366.152818] kernel msg: ebtables bug: please report to author: bad policy 02:21:20 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xf6ffffff, &(0x7f000000a000)) [ 2366.263502] rpcbind: RPC call returned error 22 02:21:21 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f00000000c0)={0x1, 0x1f}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:21:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:21 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000180)="0dbd6a09c18f39fed6b6c1e19a5a36a99895118bb762591a695bc6d34eb661655228353efc0b4a8a126a27f5018fb99537d453beef246f73d7b0351a61d2c7531068fafcf92915e9479839e88d599927dacd6538dfb3bceea9a048a73b1078cc3d4bbabe36a0874d0a27b29c12b3def6d204d3794aea2dbbd795359b8b8ae46d608ab6e7c7e11d2f4b0efbe5aa911fe750664bed20b4209d8a0667ff6d92a89cff46f863b6b7e9b8924abe3cfb1062510f7496e2a404bbe14fd41cb071de5a022c437428b36132925f5395dc90189bbdab9640daf16ec96780fa3f8816c5a2a9f0ba8f688c1e6fa53465ed5cfab9575d14bc8e", 0x0}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(r2, &(0x7f00000007c0)) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)) getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="1000010000000000200002000000"], 0x1, 0x1) 02:21:21 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x2, &(0x7f000000a000)) [ 2366.820829] FS-Cache: Duplicate cookie detected [ 2366.825597] FS-Cache: O-cookie c=00000000f10f3d68 [p=00000000d521cfab fl=222 nc=0 na=1] [ 2366.833925] FS-Cache: O-cookie d=00000000a5cfa8b5 n=000000008f9f1430 [ 2366.840465] FS-Cache: O-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2366.848027] FS-Cache: N-cookie c=000000004f48f0d7 [p=00000000d521cfab fl=2 nc=0 na=1] [ 2366.856010] FS-Cache: N-cookie d=00000000a5cfa8b5 n=000000006f99879d [ 2366.862590] FS-Cache: N-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2366.877148] kernel msg: ebtables bug: please report to author: bad policy [ 2366.884830] rpcbind: RPC call returned error 22 [ 2366.891834] rpcbind: RPC call returned error 22 [ 2366.913464] rpcbind: RPC call returned error 22 02:21:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup3(r0, r0, 0x2a91b6d1c68d09f7) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000140)={0x7f, 0x1, 0x3f, 0x2, 0x401, 0x903, 0x1f, 0x6, 0x7, 0x8}) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x100000001, 0x28140) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000100)={0x7, {0x4, 0x1, 0x1, 0x6}, {0x41, 0x2, 0x8, 0x7}, {0x40, 0x1}}) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:21:23 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x274, &(0x7f000000a000)) 02:21:23 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000180)="0dbd6a09c18f39fed6b6c1e19a5a36a99895118bb762591a695bc6d34eb661655228353efc0b4a8a126a27f5018fb99537d453beef246f73d7b0351a61d2c7531068fafcf92915e9479839e88d599927dacd6538dfb3bceea9a048a73b1078cc3d4bbabe36a0874d0a27b29c12b3def6d204d3794aea2dbbd795359b8b8ae46d608ab6e7c7e11d2f4b0efbe5aa911fe750664bed20b4209d8a0667ff6d92a89cff46f863b6b7e9b8924abe3cfb1062510f7496e2a404bbe14fd41cb071de5a022c437428b36132925f5395dc90189bbdab9640daf16ec96780fa3f8816c5a2a9f0ba8f688c1e6fa53465ed5cfab9575d14bc8e", 0x0}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(r2, &(0x7f00000007c0)) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)) getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="100001000000000020000200000000"], 0x1, 0x1) 02:21:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:23 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='ntfs\x00', 0x2804000, &(0x7f0000000140)='/securitymime_type{&\'ppp0}\x00') 02:21:23 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000180)="0dbd6a09c18f39fed6b6c1e19a5a36a99895118bb762591a695bc6d34eb661655228353efc0b4a8a126a27f5018fb99537d453beef246f73d7b0351a61d2c7531068fafcf92915e9479839e88d599927dacd6538dfb3bceea9a048a73b1078cc3d4bbabe36a0874d0a27b29c12b3def6d204d3794aea2dbbd795359b8b8ae46d608ab6e7c7e11d2f4b0efbe5aa911fe750664bed20b4209d8a0667ff6d92a89cff46f863b6b7e9b8924abe3cfb1062510f7496e2a404bbe14fd41cb071de5a022c437428b36132925f5395dc90189bbdab9640daf16ec96780fa3f8816c5a2a9f0ba8f688c1e6fa53465ed5cfab9575d14bc8e", 0x0}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(r2, &(0x7f00000007c0)) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)) getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="100001000000000020000200000000"], 0x1, 0x1) [ 2368.920504] kernel msg: ebtables bug: please report to author: bad policy [ 2368.950359] rpcbind: RPC call returned error 22 02:21:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:23 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3fe, &(0x7f000000a000)) 02:21:23 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xf5ffffff00000000, &(0x7f000000a000)) [ 2369.083133] rpcbind: RPC call returned error 22 [ 2369.085712] kernel msg: ebtables bug: please report to author: bad policy 02:21:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:23 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000180)="0dbd6a09c18f39fed6b6c1e19a5a36a99895118bb762591a695bc6d34eb661655228353efc0b4a8a126a27f5018fb99537d453beef246f73d7b0351a61d2c7531068fafcf92915e9479839e88d599927dacd6538dfb3bceea9a048a73b1078cc3d4bbabe36a0874d0a27b29c12b3def6d204d3794aea2dbbd795359b8b8ae46d608ab6e7c7e11d2f4b0efbe5aa911fe750664bed20b4209d8a0667ff6d92a89cff46f863b6b7e9b8924abe3cfb1062510f7496e2a404bbe14fd41cb071de5a022c437428b36132925f5395dc90189bbdab9640daf16ec96780fa3f8816c5a2a9f0ba8f688c1e6fa53465ed5cfab9575d14bc8e", 0x0}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(r2, &(0x7f00000007c0)) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)) getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="10000100000000002000020000000000"], 0x1, 0x0) [ 2369.209563] kernel msg: ebtables bug: please report to author: bad policy [ 2369.236248] rpcbind: RPC call returned error 22 [ 2369.257829] rpcbind: RPC call returned error 22 [ 2369.264808] rpcbind: RPC call returned error 22 02:21:26 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:26 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x4c00000000000000, &(0x7f000000a000)) 02:21:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:26 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="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", 0xfb}], 0x1}, 0x0) 02:21:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000000008000c00000005db0000000000000000000000", @ANYRES32=0x0], 0x1c}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffa000/0x2000)=nil) r2 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x4, 0xd40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000340), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{{{0x1f, 0x60, 0x6007, 'bridge_slave_0\x00', 'teql0\x00', 'sit0\x00', 'vlan0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @link_local, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x98, 0xe0}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x2}}}]}, @common=@log={'log\x00', 0x24, {{0x2, "b29eab12e09f7e51fc24983d85489074f0122a83d2502c51089b8bbd7145", 0xa}}}}, {{{0x15, 0x2, 0x8100, 'ip6tnl0\x00', 'veth0_to_bridge\x00', 'veth0\x00', 'nr0\x00', @local, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0xff], 0x9c, 0xf4, 0x11c, [@m802_3={'802_3\x00', 0x8, {{0x6, 0x4, 0x0, 0x4}}}]}, [@common=@dnat={'dnat\x00', 0xc, {{@broadcast, 0xfffffffffffffffe}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffffff9}}}]}, @common=@STANDARD={'\x00', 0x4, {0xfffffffffffffffc}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x88ff, 'dummy0\x00', 'bond_slave_1\x00', 'bridge_slave_0\x00', 'erspan0\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @dev={[], 0xf}, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0x100, 0x150, 0x17c, [@physdev={'physdev\x00', 0x6c, {{'vcan0\x00', {0xff}, 'syzkaller1\x00', {0xff}, 0x8, 0x8}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0x6}}}, @common=@redirect={'redirect\x00', 0x4, {{0xfffffffffffffffc}}}]}, @common=@mark={'mark\x00', 0x8, {{0xffffffe0, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x3, 0x0, 0x1, [{{{0x0, 0x5f, 0x805, 'veth1\x00', 'syzkaller1\x00', 'team_slave_1\x00', 'ip6tnl0\x00', @broadcast, [0xff, 0xff], @empty, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x8c8, 0x910, 0x938, [@among={'among\x00', 0x834, {{0x80000000, 0xffa, 0x3, {[0x4, 0x5049b06d, 0x9, 0x7, 0x60b, 0x1, 0x2, 0x6, 0x40, 0x7, 0x5, 0x100000000, 0xbd8, 0x5, 0x2, 0x1, 0x7, 0x1, 0x9, 0x0, 0x5, 0xff, 0x6, 0x3, 0x0, 0x5, 0xfff, 0x8, 0x7ff, 0x3, 0x5, 0x3, 0x1, 0x3, 0x18d, 0x6, 0x7fffffff, 0x1f, 0x3, 0x4, 0x4, 0x100, 0x8001, 0x7, 0x100000001, 0x0, 0x4, 0x9, 0x8001, 0x7, 0x9, 0x8, 0x40, 0x6a7, 0x1, 0x2, 0x13b3, 0x2, 0x6, 0x3f, 0xffffffffffffff06, 0x6, 0x3, 0x6, 0x9, 0x644, 0x9, 0x3, 0x5, 0x81, 0x3000000, 0x5e, 0x2, 0x8, 0x8, 0x0, 0x7, 0x7f, 0x5, 0x100000001, 0x1, 0x7fffffff, 0x9, 0x8, 0x10000, 0xfffffffffffffffe, 0x0, 0x8, 0x3, 0x84, 0x8, 0x9, 0x7be, 0x2, 0x3, 0x2, 0x9, 0x4, 0x7fffffff, 0x5cb, 0x1, 0x0, 0x9, 0x6, 0x3, 0xe3, 0x0, 0x5, 0x3, 0x9, 0x9, 0x89, 0xfffffffffffffffc, 0x5, 0x80000001, 0x9f5, 0x1, 0x3, 0x81, 0xffffffffffffffff, 0x100000001, 0x5, 0x5, 0x7b7, 0x2, 0x5, 0x9, 0x2, 0xff, 0x2, 0xff, 0x2, 0xfff, 0x1, 0xdbd9, 0x1, 0x20, 0x4, 0x4, 0x6, 0x2, 0x2c, 0x6, 0xc9, 0xf8, 0x3, 0x6, 0x10000, 0x401, 0xfff, 0x4, 0x40, 0x1ff, 0x6, 0x100000000, 0x4b9, 0x6, 0x7ff, 0x80, 0xf61f, 0x5, 0x5, 0xe8, 0x9786, 0xffff, 0x3833a1cf, 0x0, 0x836, 0x0, 0x0, 0x3ff, 0x1, 0x5, 0x0, 0x7fff, 0x8, 0x2, 0x4, 0x7fff, 0x8, 0x9, 0x8001, 0x1, 0x20, 0xe5, 0xe9, 0x1, 0xffffffffffffffe0, 0x60000, 0x100, 0xfffffffffffffffe, 0x200, 0x8, 0x3, 0x4, 0x8, 0x2, 0x2, 0x3, 0xfff, 0x27e, 0x80000001, 0x7fffffff, 0x0, 0x2, 0x3, 0x2e, 0x6, 0xf10, 0x3ff, 0x20, 0x7, 0x1, 0x7, 0x1, 0x0, 0x6, 0x1, 0xffffffff, 0xbb9, 0x8, 0x800000, 0x401, 0x2d, 0x6, 0x7, 0xe9f2, 0x4, 0x0, 0x7, 0xb076, 0x9, 0x800, 0x101, 0x7ff, 0xbf, 0x8db0, 0x7f, 0x6, 0x9, 0x3, 0x80000000, 0x2e36d536, 0x9, 0x1, 0x2, 0xc5, 0x1000, 0x6, 0x5, 0x40, 0x2, 0x2, 0x4, 0x401, 0x9, 0x9], 0x1, [{[0x0, 0x7e9c5d20], @loopback}]}, {[0x0, 0x4, 0x8001, 0x5, 0x7fff, 0xff, 0x100, 0x800, 0x3, 0x4ecb, 0x1, 0x224, 0xff, 0x35f, 0xffffffffffffffff, 0x3, 0x3, 0x6, 0x3, 0x2, 0x8000, 0x0, 0x6, 0x0, 0x1, 0x4, 0x3, 0xfffffffffffffffb, 0x5, 0x37d5, 0x8, 0xffffffff, 0x8, 0x8, 0x5, 0x5f07, 0x4, 0x10001, 0x6, 0x101, 0x2, 0xdfa9, 0x2, 0x7, 0x6, 0x7, 0x2, 0x0, 0x5b2c, 0x9, 0x4, 0x1, 0x3, 0x3ff, 0x1, 0x84, 0x10001, 0x7, 0x9a0, 0x9, 0x2, 0x0, 0x3ff, 0x80, 0x3f, 0xff, 0x81c1, 0x8, 0x40, 0x3, 0x6, 0x7, 0xff, 0x4, 0x5a, 0x8, 0x0, 0x1ff, 0x5, 0x8, 0x6, 0xd44, 0x4, 0x3, 0xfffffffffffffff9, 0x1, 0x3, 0x10001, 0x8000, 0x6, 0x3, 0x100000000, 0x5, 0x7fff, 0x2, 0x280000000000, 0x9446, 0x2, 0x401, 0x8fc5, 0x14, 0x2, 0xaed, 0x1, 0xfffffffffffff40d, 0x7, 0x2, 0x3f, 0x3, 0x4, 0x0, 0x1, 0x1, 0x3, 0x4a15, 0xb, 0xf65, 0x80, 0x1f, 0xa69, 0xa2, 0x80, 0x9, 0x5, 0x8001, 0x7, 0x667, 0xd6, 0x2, 0x20, 0xbc, 0x5, 0xffffffffffff180c, 0x5, 0x0, 0x1000, 0x80000000, 0x3, 0x5, 0x760e, 0x8, 0xfe, 0xfbf4, 0x8, 0x10001, 0x3, 0x5, 0x7fffffff, 0x2, 0x101, 0x2, 0x80000001, 0x90fd, 0x0, 0x9, 0x0, 0x80000001, 0x20, 0x61, 0xffffffff, 0x5, 0x5, 0x8, 0x3aea, 0x200, 0x8000, 0x6, 0x1436, 0x3, 0x80000001, 0x8, 0x5, 0x1, 0x312, 0xf5, 0x1, 0x0, 0xffff, 0x5, 0xffffffffffffff00, 0x4, 0x9, 0x8, 0x8001, 0x10000, 0x7, 0x80, 0x0, 0x0, 0xfffffffffffffffd, 0xffffffff82a2a7be, 0x800, 0x0, 0x7, 0x8000000000000000, 0x76, 0x8, 0x4, 0xe90c, 0x5, 0xaede, 0x2, 0x3, 0x5, 0x5, 0x8, 0x8, 0x380000000000, 0x0, 0x3, 0x10001, 0xfffffffffffffff8, 0x8, 0x7, 0x8d6, 0x5b2, 0x2, 0x8001, 0x0, 0xfffffffffffffffe, 0xee, 0x7, 0x66024e5, 0x0, 0x101, 0x7f, 0x0, 0xa, 0x0, 0x8000, 0x0, 0x793, 0x8, 0x6, 0x5, 0x0, 0x101, 0xffffffffffffffff, 0xcef2, 0x1, 0x6, 0xfffffffffffffbff, 0x8, 0x100000000, 0x36c, 0x0, 0x8, 0x6, 0x400, 0x27e6, 0x8, 0x1f, 0x3f, 0x5, 0x5, 0x5, 0x20], 0x1, [{[0x1, 0x5], @empty}]}}}}]}, [@common=@log={'log\x00', 0x24, {{0x0, "117014cf3ecc27fba41d6827c1ae9645537925a31b2256942962149a4de3", 0x8}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x4, {{0x2}}}}]}]}, 0xd90) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r1, 0x900, 0x4, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xe3909d19ee9c90a8, 0x4}}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x0) 02:21:26 executing program 0: r0 = socket$inet(0x2, 0x20000000, 0x0) bind$inet(r0, 0x0, 0x0) socketpair(0x8, 0x2, 0x364, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000200)=0xfffffffffffffffb, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400ef001c00fdff000000000000000001000000beba7b0979d0e05b8385014b58f98ac85770a89f3cb3a1cea732afae3395cc964687b9e669f9aea73ffc993a777d9367d008436b24e9ff87697a12b7191770e67727c172f8b7b0585563dba90fe6828079ca38319161c79f487acd5cc76eb950092ad24eea9ed86dc269c533b42d8201599b422044485a9794eee2b0e42b757bf23bdeeade38f4fb1834eab06dfa308427bb8cd5346537ccafb0eef0b38177401f93c80dfe96b9a06c60b05f59acc70a8f141b763cce052e9777067af7940f85f19a7c768cf9100d31443ec3bd39c68181122f7662b4a523627f76017d2d"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) mknod$loop(&(0x7f0000000040)='./file0\x00', 0xc0a0, 0x1) [ 2371.519188] kernel msg: ebtables bug: please report to author: bad policy [ 2371.531737] netlink: 215 bytes leftover after parsing attributes in process `syz-executor4'. [ 2371.544358] rpcbind: RPC call returned error 22 [ 2371.562255] rpcbind: RPC call returned error 22 02:21:26 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfe, &(0x7f000000a000)) 02:21:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:26 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) 02:21:26 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x401, 0x6, 0x80000000, 0x0, 0x3, 0x3e, 0x14695563, 0x397, 0x40, 0x164, 0x9, 0x7, 0x38, 0x2, 0xfff, 0x1, 0xfffffffffffffb08}, [{0x60000000, 0x6e, 0x2, 0x7, 0x5, 0xffffffffffffffff, 0x3, 0x7fffffff}], "ed37f491a62707b7951700313eed9954b8e4f48788ec7a8b2a2da59919da234afc1db7e9a9ae95dbfe8f5bd19a5f78c154361af7db3c2e47020d18ee11996814a4095ba6e631a10d97bfc238ee7f3d31190eec18b659d1fd2acd7e8d33860f1b0eae520823c3597107af3b6c51d057cfb00aa7369cb0e51f7aeb223b6ee93c763aa56f8cfc8437e65ba6ad747b9eccbe9f94f65373edcc06cea65219e221d53a100a3f495808275afd1e9c27f6", [[], [], [], [], [], [], [], []]}, 0x925) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) [ 2371.681974] kernel msg: ebtables bug: please report to author: bad policy 02:21:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000380)=0x20800, 0x4) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a45321, &(0x7f0000000640)={{0x7ff, 0x800000000000000}, 'port0\x00', 0x54, 0x120c06, 0x4c9, 0x6, 0xc, 0x0, 0x4, 0x0, 0x5, 0xdf16}) ioctl$int_in(r1, 0x5421, &(0x7f0000000100)=0x1f) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0xdc, &(0x7f00000001c0)=[@in6={0xa, 0x4e21, 0xc85, @ipv4={[], [], @multicast1}, 0x1}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e20, 0x1, @empty, 0x5}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e24, 0x401, @remote}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e24, 0xffffffff80000001, @mcast2, 0x2}, @in6={0xa, 0x4e21, 0x7, @remote, 0x9}]}, &(0x7f0000000300)=0xc) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000340)={r2, 0xfff, 0x10}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000003c0)={r2, 0x80000001, 0x7f}, &(0x7f0000000400)=0x8) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x1c}}, 0x0) 02:21:26 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x8cffffff00000000, &(0x7f000000a000)) [ 2371.866461] rpcbind: RPC call returned error 22 [ 2371.878019] rpcbind: RPC call returned error 22 02:21:28 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000040)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x32f) sendmmsg(r0, &(0x7f00000053c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001c80)=[{0xc}], 0xc, 0x4000}, 0x100000000}], 0x1, 0x41) 02:21:28 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xcc03, &(0x7f000000a000)) 02:21:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x0) write$eventfd(r1, &(0x7f0000000100)=0x8, 0x8) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:21:28 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'vlan0\x00', 0xd7c}) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x100000000, 0x80) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000100)=0x80000000, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="14000000454afdff100000000000000001000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:21:28 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x6c00, &(0x7f000000a000)) [ 2374.075433] kernel msg: ebtables bug: please report to author: bad policy [ 2374.090574] rpcbind: RPC call returned error 22 [ 2374.098223] rpcbind: RPC call returned error 22 02:21:28 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x100000011, @multicast2, 0x2, 0x0, 'lblc\x00'}, 0x2c) 02:21:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2374.239849] kernel msg: ebtables bug: please report to author: bad policy 02:21:29 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x12, &(0x7f000000a000)) 02:21:29 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{0x9, 0x1ff, 0x7, 0x54e}, {0x800, 0xfffffffffffff6c6, 0x9, 0x100}, {0x5, 0xffffffffffffffff, 0x80, 0xb587}, {0x9, 0xfffffffffffffff8, 0x93e4, 0x1}, {0x5, 0x3, 0x5, 0x8}, {0x6, 0x101, 0x119e, 0x1}]}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @remote}}, 0x8, 0x80000000}, 0x88) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='\x00', 0x4) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000200)=0x2, 0xffffffffffffff88) 02:21:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="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", 0xfb}], 0x1}, 0x0) socket$kcm(0x11, 0x0, 0x300) [ 2374.388657] rpcbind: RPC call returned error 22 [ 2374.410537] netlink: 215 bytes leftover after parsing attributes in process `syz-executor4'. 02:21:31 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:31 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xf6ffffff00000000, &(0x7f000000a000)) 02:21:31 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x1fffffff0007fffc) 02:21:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x7, 0x4402) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f00000003c0)={0x8000, "4996950b713462dd4850eb9fed5e88291822faad18f577381d6e587b9521c257", 0x2, 0x40, 0x6, 0xf900, 0xa}) memfd_create(&(0x7f00000001c0)='/dev/video37\x00', 0x3) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r2, &(0x7f0000000280)="217d72510b86d738c44867039c0a51827fe04ccccb7bc16ed189fef84d6268d2184a67a3393034422dec6b1420f59933521dc1b73762d93a9f30877b61e1af7d96a5221982925136f5bc4a56d098410015a93bd37fbccf559e83b6f2ec85f6560b1396dd4a23eebb3239b2cf181c4134c0507b150a727d69867bf7ea41a13a3e8f80603865a9790d24d52532807dcca66b5b841ee417ff67971d6f24ea18efe8f125d84446e6d794a191a8a6c98836deeb2a31878ec20afc8a3a61b0da20969ce5a6dd173d2eceb08b2127627f270feda4ba83", 0xd3) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) setsockopt(r0, 0x6fd85af9, 0x8, &(0x7f0000000100)="b20fcb34059ada9227f5079cb6ea426a9e2b4ad9e8ee34c7bfec73f02ddef6871a8e9f1e12e787d4baf4e63e8c2a0b6c7d31b730a88c07563df0687f761d62a9915f4b68795bcc5afe10a02ad7704bca0f5b99990c886294b720b7293101160c2c913ddd2e3d2fb2e0f1b76fdd1f5e2529d73f10f540a5078095e5a30123e6b849613ab67d6f1ddbef10e86f59d8867bd88400d5089e4f", 0x97) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) 02:21:31 executing program 0: r0 = socket$inet(0x2, 0x0, 0xa3) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x15) write$P9_RMKNOD(r2, &(0x7f00000001c0)={0x14, 0x13, 0x2, {0x44, 0x4, 0x7}}, 0x14) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="1400000028010000000000000000000001000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1ff, 0x40000) ioctl$sock_bt_bnep_BNEPCONNDEL(r3, 0x400442c9, &(0x7f0000000140)={0x2, @local}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x410001, 0x0) ioctl$KVM_GET_ONE_REG(r4, 0x4010aeab, &(0x7f00000000c0)={0x6ad135a4, 0x9}) 02:21:31 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x8400000000000000, &(0x7f000000a000)) [ 2376.730393] rpcbind: RPC call returned error 22 [ 2376.741759] kernel msg: ebtables bug: please report to author: bad policy 02:21:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2376.826465] rpcbind: RPC call returned error 22 02:21:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002680)=ANY=[], 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000140)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) clone(0x4000000000007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000340)=0x2, 0x4) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000000f4, 0x900) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000cc0)=@filter={'filter\x00', 0xe, 0x4, 0x5d8, [0x0, 0x200006c0, 0x20000944, 0x20000bb0], 0x0, &(0x7f0000000200), &(0x7f0000001240)=ANY=[@ANYBLOB="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"]}, 0x6af) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000240)) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f00000006c0)={0x8, 0x52cf292f, [{0x4, 0x0, 0x3}, {0x5, 0x0, 0x4000}, {0x6, 0x0, 0x6}, {0x7ff, 0x0, 0x8}, {0x5, 0x0, 0x80}, {0x6}, {0x32, 0x0, 0x2}, {0x7, 0x0, 0x4}]}) clone(0x0, &(0x7f0000000280), 0x0, &(0x7f0000000380), &(0x7f00000003c0)="efb2dddb603fe9251bfe24869e136c96c55737d4263f5e98ea1c025b899aebe52c85fd094b5722d0ae1a715adde7c46ba31e5ef0b623ac82c7553c2b80d2b632524f6840e7cf87008890ac466d48566b5e95e6b9a575733b53b065d0ed83a24db977a96c8378b0adb60a26bcb1ac73c4b7105e50e2942eb5725dac4a2b07d6471fded1") ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x100, 0x1, 0x6, 0x2, 0x0, 0x90, 0x204, 0xd, 0x2, 0x0, 0x7, 0x2, 0x80000000, 0x80000001, 0xf0, 0x5, 0x5, 0x200, 0x9, 0x45, 0x1f, 0x400, 0x0, 0x73, 0x401, 0x5, 0x8, 0xc359, 0x4da, 0x9, 0x91, 0x47, 0x4, 0xf630, 0xfff, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x5, 0xff}, 0x10402, 0x401, 0x101, 0x0, 0x3, 0x0, 0x2}, r2, 0xffffffffffffffff, 0xffffffffffffff9c, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000840)=0x5195, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000640)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000007c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x8, @remote, 0x10000}, {0xa, 0x4e24, 0x4, @mcast1, 0x7000000000}, r3, 0xfffffffffffffffc}}, 0x48) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000680), 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000480)={0xffffffffffffffff}, 0x106, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x0, "50a3882e5b92c1a4476b68228728afd7e35c9788a37431b2c2b368eb455f2badca3e11500c12cd562f56e5b772d7a0111ed7be32357252d1298532855c8d5c34984257156979e1ca628f50a7d3c2a993a74e1d966f9eb28faa47e46a1182270a96c29224d2da9b6fa8d890d6b74700e8c715676e132dc167f33cf05ceb20b9fe30493c17e6271db46650ada8ecfdab129f9c2decf825bb1294c79ab1319292d687452af9d357abf5c90338e7c0c9a33b3df1bd24d2e09462a33288006aa641abccbec0a36e69dd86de95d765f36fee92e12dcb805d8220acc310e9fd6fb43ecdf75ce44e01bf1e5d257b440ec9f13e66433a3e3a80742191da45891af7b5d26e", 0x0, 0x0, 0x442, 0xd2c, 0x0, 0x0, 0x100000001, 0x1}, r4}}, 0x128) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000009c0)={r1, &(0x7f0000000880)="db39a430d62f78a0d93baaef9d93d03dafc03ec96dff597574ae54195c79bab4a095d6475b16181f0c3dcc720da6794705de279fc6afae7504ddfbe8af776de8a89306fa9c9a1be59bf6f58853f421d778b609ad28f58a485c0985c46e4b11ef4f8722a4644ac2924fd272fac5da6286cc6ebcc26e1679932e2e315d9eeeca1f10b13555893d8ef00175de33d0db51942eaa68ead84c135f052e6146ea96b1007939b3f2f7d4a86c0af4491f00c541e04acd20befd240b2e4c183d07201f33a5b6f9e5cb3430679d8bd78dd70bc368fc02a96b72c955d8ecc209e3368c07c9344e24", &(0x7f0000000980)=""/18}, 0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={r5, 0x6, 0xe00000000000}, &(0x7f00000001c0)=0x8) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200400, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r7, 0x10e, 0x8, &(0x7f0000000140)=0x2, 0xffffff59) ioctl$DRM_IOCTL_GET_CAP(r7, 0xc010640c, &(0x7f00000000c0)={0x9, 0x23}) sendmsg$nl_generic(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[]}}, 0x0) 02:21:31 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xf0ffffffffffff, &(0x7f000000a000)) 02:21:31 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"f96509f61c23b6d76caac4564a64ffbd"}}}}, 0x90) [ 2376.914775] kernel msg: ebtables bug: please report to author: bad policy 02:21:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2377.085216] kernel msg: ebtables bug: please report to author: bad policy 02:21:33 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:33 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x8030000, &(0x7f000000a000)) 02:21:33 executing program 0: r0 = socket$inet(0x2, 0x80002, 0xb2) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:21:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x1100000000000000) 02:21:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r0, &(0x7f0000000100)) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000220001000000000000000000040000549d7fd90052145ece5418c3f3f88965543e03710db4f895cac3717249af3410772afcdec7f4961f", @ANYRES32=0x0], 0x1c}}, 0x0) [ 2379.269353] kernel msg: ebtables bug: please report to author: bad policy [ 2379.279656] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 02:21:34 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x2e000000, &(0x7f000000a000)) 02:21:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2379.417193] rpcbind: RPC call returned error 22 02:21:34 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x300, &(0x7f000000a000)) [ 2379.445784] kernel msg: ebtables bug: please report to author: bad policy 02:21:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x90}}, 0xe8) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r1, &(0x7f00000000c0), 0x1c) write$binfmt_script(r1, 0x0, 0x0) 02:21:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2379.564216] rpcbind: RPC call returned error 22 02:21:34 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xff00000000000000, &(0x7f000000a000)) [ 2379.649294] kernel msg: ebtables bug: please report to author: bad policy [ 2380.082597] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 2380.708600] device bridge_slave_1 left promiscuous mode [ 2380.714151] bridge0: port 2(bridge_slave_1) entered disabled state [ 2380.767816] device bridge_slave_0 left promiscuous mode [ 2380.773356] bridge0: port 1(bridge_slave_0) entered disabled state [ 2380.875816] team0 (unregistering): Port device team_slave_1 removed [ 2380.892249] team0 (unregistering): Port device team_slave_0 removed [ 2380.905426] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2380.954201] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2381.045673] bond0 (unregistering): Released all slaves 02:21:37 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:37 executing program 2: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x50) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000001500)={0x0, @in6={{0xa, 0x4e22, 0x100000000, @mcast1, 0x2}}, 0x0, 0x8, 0x1000, 0x3ff, 0xb4}, &(0x7f0000000400)=0x98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000480)={0x0, 0x10001, 0x2435d065e01a3a50, 0x6, 0x5}, &(0x7f00000015c0)=0x18) sendmsg$inet_sctp(r1, &(0x7f0000001680)={&(0x7f0000000100)=@in={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000140)="5483c7bb40ed919885859f63cbc447f8f1298dd5d901127002183f26f47d62c6d22b264f87ebbb36851321e14ff5e11a458f00043b3794dab3b9dbec3ead5b07953ab474b5ee25d151108a143a76fbe1c2a1c698b70a049318657c7f517eccd9a5cb31ab3f6424918601b6a5fb33d4bf98002839da6b8d824c1f54df1caa29a333c4482aaba2c12e284f4761", 0x8c}, {&(0x7f0000000200)="1f005797eda722f0695d092c2a81ff88f42edf395cfbeec2272c1cbf238e14b59d862f71268921853d80b9ddc9525f9d206ff8612c1b7868d5802eea9deabe9f691609167b1c6008f549943dc0c1329a0300ca28c8056e5e50fc5a5f4aadad2fb8bf90883522197581bb", 0x6a}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000000280)="6374dc26067ca9d94877bad16f00f11a5e57bad9444d0e175c30f68b81e9da8d5036772e076b55462d508491d42ad990b48bcce53937cebf8b39c1f21a567b6ec919674e30338fc0066a6569a8b5579b2b58d63250ad618652303bbc6a7d376eaf938948738a54050276", 0x6a}, {&(0x7f0000000300)="dcbf13743b16ca656fddaf4f477fd098734599e06fd3a70ffbac83b3879092de1428efb09ffce161c1e3a886451f980801a71ce22624c17a10f331a2b59e7d4d4c76ec90108701dcb36a23e10b5014a7cc8b4ed715bc9d0fd6db076da13eafb89357aafd0cbd7f8553c7dbfda79bd545c240eb21ca6f98ce59673005b02e09b4db0e0faf9d1e29be3383457a497cd9dd3ea7855fbfd0fff0c332acb9aede4b6eef9aad5f12e31f2227b20608f83bb232e258e948ff1d8e76", 0xb8}], 0x5, &(0x7f0000001600)=[@dstaddrv4={0x10, 0x84, 0x7, @remote}, @sndinfo={0x1c, 0x84, 0x2, {0x10001, 0xe, 0x101, 0x7f, r2}}, @prinfo={0x14, 0x84, 0x5, {0x30, 0x101}}, @sndinfo={0x1c, 0x84, 0x2, {0x5, 0x5, 0xffffffffffffffe0, 0x2, r3}}], 0x5c, 0x40}, 0x20000000) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:21:37 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x0, 0x0}, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="272000d7190f1b000000000000000000000000000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:21:37 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x18030000, &(0x7f000000a000)) [ 2382.852121] kernel msg: ebtables bug: please report to author: bad policy 02:21:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:37 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) [ 2383.034825] kernel msg: ebtables bug: please report to author: bad policy 02:21:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x108, 0x130}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x2f0) [ 2383.150448] IPVS: ftp: loaded support on port[0] = 21 02:21:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) [ 2383.205644] kernel msg: ebtables bug: please report to author: bad policy [ 2384.168682] bridge0: port 1(bridge_slave_0) entered blocking state [ 2384.175160] bridge0: port 1(bridge_slave_0) entered disabled state [ 2384.183227] device bridge_slave_0 entered promiscuous mode [ 2384.227431] bridge0: port 2(bridge_slave_1) entered blocking state [ 2384.233909] bridge0: port 2(bridge_slave_1) entered disabled state [ 2384.242073] device bridge_slave_1 entered promiscuous mode [ 2384.288340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2384.331447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2384.464322] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2384.512129] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2384.726893] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2384.734382] team0: Port device team_slave_0 added [ 2384.779813] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2384.788231] team0: Port device team_slave_1 added [ 2384.831475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2384.879407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2384.929279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2384.974611] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2384.981802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2384.995688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2385.457597] bridge0: port 2(bridge_slave_1) entered blocking state [ 2385.463995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2385.470710] bridge0: port 1(bridge_slave_0) entered blocking state [ 2385.477103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2385.487199] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2385.967663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 02:21:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x108, 0x130}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x2f0) 02:21:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:21:41 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) splice(r1, &(0x7f0000000040), r0, &(0x7f00000000c0), 0x6, 0x2) [ 2386.918540] kernel msg: ebtables bug: please report to author: bad policy [ 2387.471854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2387.653522] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2387.813769] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2387.820756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2387.838018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2387.985526] 8021q: adding VLAN 0 to HW filter on device team0 02:21:43 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x6c000000, &(0x7f000000a000)) 02:21:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x108, 0x130}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x2f0) 02:21:43 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x40000, 0x8) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, r1, 0x408, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x21}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x31}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x4040004) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000240), 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:21:43 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f0000000200)={0xa, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @dev}]}) execveat(r1, &(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000480)='/dev/bus/usb/00#/00#\x00'], &(0x7f0000000540)=[&(0x7f0000000500)='\x00'], 0x1000) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000300)={r4, 0xe5, "70a97e26407cb9a0dbef490c3f631f2c0f5bf3bbac155f31b8436ef3ccca26f2d8df9bc38c9c612e7fe55a12b964c04515f303ee17ece86bba5d1cdd9a1a37aef4e03945a196466e3633c47fc24aab01014a19d3402224089879b3147a13e0420442cda6767974be42994c7bb20e06836af3a1bbe5d56a135536a8dfd13dd74fac6b640bd55376b975f3ac32bf444d9c7d64470c3f329774ae5e6addc1883b04ca12aecd89819879550cc1f24f062684fc1ee358d523c5c0aa2f1583c1f71803b866ea51439965e21e193a3770bf9e1cfce761d245609f1dc2ebe492f4b5246bbb95af7f85"}, &(0x7f0000000400)=0xed) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="0e00006473000c412cf67d67b9b2a55cbf229527102d52799c79dd81676b2289d4832096f6e2e188cc5e472ae9fe47dceca0e854e436eeca7e9073bf6fb67a4a5efd47c257f238367849e27c9a8ecb3cc3b0f65ff719333ac58b701d9cd827d2fbb7f875c525c297ab4247da6e8e48a4239a6cfbc82c1fc01948cc075e16a39d75"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) [ 2389.088777] kernel msg: ebtables bug: please report to author: bad policy [ 2389.120481] rpcbind: RPC call returned error 22 02:21:43 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x2000, &(0x7f000000a000)) 02:21:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:45 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:45 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000006c0)={0x0, 0x2c, &(0x7f0000000680)=[@in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e22, 0x2c1, @empty, 0x1}]}, &(0x7f0000000700)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000740)=ANY=[@ANYRES32=0x0, @ANYBLOB="1f1000007d7043691411b1da6a61f701b700d833aca1d1bddc9758ab162ca0dd603d99"], &(0x7f0000000780)=0x27) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000007c0)={0x0, 0x4}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a40)={0x0, @in={{0x2, 0x4e22, @remote}}}, &(0x7f0000000b00)=0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000c00)=[{&(0x7f0000000e80)=@in6={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0x16}, 0x6c0000000000}, 0x1c, &(0x7f0000000d40)=[{&(0x7f00000001c0)="b5cd5193b520aaa16fbd4ea57bab10d2a4cb632abafcb0547e0821eaee21ddf2f1cf", 0xe1}, {&(0x7f0000000980)="59339a82038cf1dfd70857357d6ce077715b9f3672e26fd48a38dec5bee7942c539497eeff306ed8f50d41daf40def0fdbbb5877c6c2e155", 0x38}], 0x2, &(0x7f0000000d80)=[@dstaddrv4={0x10, 0x84, 0x7, @broadcast}, @dstaddrv4={0x10, 0x84, 0x7, @multicast2}, @sndinfo={0x1c, 0x84, 0x2, {0x0, 0x8, 0x10001, 0x7c, r2}}, @sndrcv={0x2c, 0x84, 0x1, {0x10001, 0x2, 0x0, 0x8, 0x7, 0x6, 0x8, 0xffffffff, r3}}, @prinfo={0x14, 0x84, 0x5, {0x20}}, @authinfo={0x10, 0x84, 0x6, {0x5e1}}, @dstaddrv6={0x1c, 0x84, 0x8, @loopback}, @dstaddrv4={0x10, 0x84, 0x7, @rand_addr=0x6fdc38fe}, @dstaddrv6={0x1c}], 0xd4}, {&(0x7f0000000940)=@in={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000a00), 0x0, &(0x7f0000000b40), 0xfe7b, 0x20000801}], 0x2, 0x4000000) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:21:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000000), 0x4) 02:21:45 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x4c00, &(0x7f000000a000)) 02:21:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7, 0x33, 0x1}, 0x7) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x1c}}, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) [ 2390.425175] kernel msg: ebtables bug: please report to author: bad policy [ 2390.448179] rpcbind: RPC call returned error 22 [ 2390.458140] rpcbind: RPC call returned error 22 02:21:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000000), 0x4) 02:21:45 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x9c03, &(0x7f000000a000)) 02:21:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xfffffffffffffc49) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:21:45 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x2de, &(0x7f000000a000)) [ 2390.626812] kernel msg: ebtables bug: please report to author: bad policy 02:21:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000000), 0x4) 02:21:47 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:47 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c200000010000009b97f9499dd834302027df04ce696e8bee50c8bcf274859d68f11926bb8baf75eab5fe255ab05e28872f000000000000000000000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:21:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:47 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xa, &(0x7f000000a000)) 02:21:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$VIDIOC_G_STD(0xffffffffffffff9c, 0x80085617, &(0x7f0000000180)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f00000001c0)=r2) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000100)="f16f0bbd42b19b5c60f6a8c84dabc9de306bf09d865cc45d99b43ff7747b417ebe391077d03f6e51043e999201b94ba9c6c61fcd5de493f963e7e9bc1885cfa897a1e5eeda219719e8aa69099afacb35996e0f7ba3e3df8556b96e0282fbe598e687e0", 0x63) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000200)=0x6, 0x81) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:21:47 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x50, &(0x7f000000a000)) [ 2392.908505] rpcbind: RPC call returned error 22 [ 2392.919644] kernel msg: ebtables bug: please report to author: bad policy 02:21:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:47 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:47 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1600000073ae4e775ba2938be0779ddc9a045d7a5e62bb4d9c1aaa7efb3aed06e93232a8a713c98a48b543ed48364484a5492b85633ffa6f6a92ca6d39ff687150575774f04546014d44a60e960d175bbd6e4fcecc5719c551f6303b4ae6156335725c1fabc18d7ff080bc61922c40013c8037c7b2fa3d5d8d2a728e6cea605c285a5b8a1a732b0e8a456e38306d2fef10000bbafce0d294edcc8a76ebe4cdbd94a4c858321cbaed"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) [ 2393.118700] kernel msg: ebtables bug: please report to author: bad policy 02:21:47 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x7400, &(0x7f000000a000)) 02:21:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:50 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:50 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfec0, &(0x7f000000a000)) 02:21:50 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="140000001c005b20938040000000000001000000"], 0x14}, 0x1, 0x800000000000000, 0x0, 0x4}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:21:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) r1 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0xc46b, 0x40080) socket$alg(0x26, 0x5, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) socketpair(0xb, 0x3, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_INPUT(r3, 0xc0045627, &(0x7f0000000140)=0x10001) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000180)) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000100)=0xfffffffffffffffb, 0x4) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0xfffffffffffffcca, &(0x7f0000000200)={&(0x7f00000004c0)={0x1c, 0x1000000022, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x0) [ 2395.608754] kernel msg: ebtables bug: please report to author: bad policy 02:21:50 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:50 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3cc, &(0x7f000000a000)) 02:21:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x84, "3ef09e8019c2a4778b615c62ae253610c60b4ce7204d1afcd88c4e9792a00937f7a5ab276df821a76c8a8117bdf54d656e1844a3ebb6ef0e2aa3bf10d118983b4b5972837c3311e22d9ff7477217683635791c8abe8bc9484ac43771d7169676014c8619a92b82cbabd9b2df3a361f54bd8cab3ccacbf893ec642d09475568a6f3efb910"}, &(0x7f0000000040)=0x8c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000002c0)={r2, 0x28, "fb3907032e33eaaed67a1a561acc7fa4ebcbedfe2c925bd786428da0e2e2a337fec634816538520b"}, &(0x7f0000000300)=0x30) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, 'security.'}, {0x20, 'wlan1&[wlan0(bdev#'}, {0x20, '-wlan0&vboxnet1'}, {0x20, 'ppp0'}, {0x20, ')'}], 0xa, "0b319854bba13d15eb7fb2b36aa58e9d9c6c2b4c0151f9c3ab65fa6abd1ef48367ffe9b929d2be17f368d6f1e983b72527a1b320969b835fd0952b1811f4a4d7c906871e5ec41719b219cfb7ffab83565016d51fa1786ea118e6a83e3b401f7170c1807e12ea31b2587a1a2430b9040ad77474780e93fcb119f026fa6ebb445496d83bfc39ee23eed8a1b05d2534804fbf78853a60911526aa5c605b03da52b74ddcd975397d9bfcd0946aeaba4e293fc13a0bae359c2533c7c644e2702d8234"}, 0xff) 02:21:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2395.821377] kernel msg: ebtables bug: please report to author: bad policy 02:21:50 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xedc000000000, &(0x7f000000a000)) [ 2395.959741] rpcbind: RPC call returned error 22 [ 2395.975362] rpcbind: RPC call returned error 22 [ 2395.981154] kernel msg: ebtables bug: please report to author: bad policy 02:21:52 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:52 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10000, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000100)=0x630) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x6) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:21:52 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x500000000000000, &(0x7f000000a000)) 02:21:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x3, 0x1c000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000240), 0x8) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x400000, 0x0) write$P9_RUNLINKAT(r0, &(0x7f00000001c0)={0x7, 0x4d, 0x1}, 0x7) accept4$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x800) bind$packet(r2, &(0x7f0000000180)={0x11, 0xf7, r3, 0x1, 0xfffffffffffffff4, 0x6, @link_local}, 0x14) 02:21:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) [ 2398.070346] kernel msg: ebtables bug: please report to author: bad policy [ 2398.086471] rpcbind: RPC call returned error 22 [ 2398.095253] rpcbind: RPC call returned error 22 02:21:52 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x7a000000, &(0x7f000000a000)) 02:21:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:53 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:53 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x4000000, &(0x7f000000a000)) [ 2398.254839] rpcbind: RPC call returned error 22 [ 2398.265772] rpcbind: RPC call returned error 22 [ 2398.279129] kernel msg: ebtables bug: please report to author: bad policy 02:21:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0x0, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2398.391600] rpcbind: RPC call returned error 22 [ 2398.404922] rpcbind: RPC call returned error 22 [ 2398.487980] kernel msg: ebtables bug: please report to author: bad policy 02:21:55 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:55 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x160, &(0x7f000000a000)) 02:21:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0x0, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) 02:21:55 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0xfd91) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xc73, 0x200000) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000100)={{0xb523, 0x9}}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:21:55 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x4800000000000000, &(0x7f000000a000)) [ 2400.751637] kernel msg: ebtables bug: please report to author: bad policy 02:21:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x0, 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0x0, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2400.863894] rpcbind: RPC call returned error 22 02:21:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfd, 0x200}, 0xffffffffffffffbd) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) [ 2400.917612] rpcbind: RPC call returned error 22 02:21:55 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xff00, &(0x7f000000a000)) [ 2400.991405] kernel msg: ebtables bug: please report to author: bad policy 02:21:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x0, 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:58 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:21:58 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfe00, &(0x7f000000a000)) 02:21:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0x0, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x0, 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x20000) getsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:21:58 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="ff000010000000000000000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:21:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) [ 2403.329412] kernel msg: ebtables bug: please report to author: bad policy 02:21:58 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x803000000000000, &(0x7f000000a000)) 02:21:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0x0, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:21:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:21:58 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x140, r2, 0xa00, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xcc4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x245a}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1b3}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xfb}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x29}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x47}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x88}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x24}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x3}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x44}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x10}}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8001}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x4}, 0x800) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:21:58 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x4800, &(0x7f000000a000)) [ 2403.549212] rpcbind: RPC call returned error 22 [ 2403.560775] rpcbind: RPC call returned error 22 [ 2403.565815] kernel msg: ebtables bug: please report to author: bad policy [ 2403.663058] rpcbind: RPC call returned error 22 [ 2403.671688] rpcbind: RPC call returned error 22 02:22:00 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:22:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0x0, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:00 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x7, &(0x7f000000a000)) 02:22:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000140)={0x0, 0x6, 0x8, &(0x7f0000000100)=0x7ff}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:22:00 executing program 0: r0 = socket$inet(0x2, 0x0, 0xfffffffffffffffe) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000100)=0x7, 0x4) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x200, 0x4000) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x2, 0x460101) setns(r2, 0x26020000) 02:22:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:22:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x0, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2405.948679] kernel msg: ebtables bug: please report to author: bad policy [ 2405.979146] rpcbind: RPC call returned error 22 [ 2405.994018] rpcbind: RPC call returned error 22 02:22:00 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x600000000000000, &(0x7f000000a000)) [ 2406.056302] kernel msg: ebtables bug: please report to author: bad policy 02:22:00 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x48, &(0x7f000000a000)) [ 2406.134597] rpcbind: RPC call returned error 22 02:22:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x0, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) [ 2406.252272] kernel msg: ebtables bug: please report to author: bad policy 02:22:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:03 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfe800000, &(0x7f000000a000)) 02:22:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x0, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:22:03 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x4e22, @broadcast}}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)=0x7ff, 0x4) 02:22:03 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x8c01, &(0x7f000000a000)) [ 2408.499349] kernel msg: ebtables bug: please report to author: bad policy 02:22:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:22:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0x0, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2408.649345] rpcbind: RPC call returned error 22 [ 2408.650856] kernel msg: ebtables bug: please report to author: bad policy [ 2408.664882] rpcbind: RPC call returned error 22 02:22:03 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfe03, &(0x7f000000a000)) 02:22:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0x0, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:03 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3f00, &(0x7f000000a000)) [ 2408.809833] kernel msg: ebtables bug: please report to author: bad policy 02:22:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0x0, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:22:05 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x4, &(0x7f000000a000)) 02:22:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000220001000000000000000000040000f3070f0c00", @ANYRES32=0x0], 0x1c}}, 0x0) 02:22:05 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e21, @broadcast}, {0x306, @broadcast}, 0x20, {0x2, 0x4e23, @multicast1}, 'yam0\x00'}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:05 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfe03000000000000, &(0x7f000000a000)) [ 2411.178680] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. [ 2411.184913] kernel msg: ebtables bug: please report to author: bad policy [ 2411.198106] rpcbind: RPC call returned error 22 02:22:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:22:06 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x81ffffff, &(0x7f000000a000)) 02:22:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x0, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2411.286411] rpcbind: RPC call returned error 22 [ 2411.294699] rpcbind: RPC call returned error 22 02:22:06 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x92ffffff, &(0x7f000000a000)) 02:22:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x0, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2411.372641] kernel msg: ebtables bug: please report to author: bad policy [ 2411.491975] kernel msg: ebtables bug: please report to author: bad policy 02:22:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000"], 0x4e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, 0x0, 0x0) 02:22:08 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfa03, &(0x7f000000a000)) 02:22:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x0, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x217) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:22:08 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000000c0)={'rose0\x00', 0x7fff}) r1 = socket$inet(0x2, 0x0, 0x0) signalfd4(r1, &(0x7f0000000040)={0x8}, 0x8, 0x800) bind$inet(r1, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x20000, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) [ 2413.827699] kernel msg: ebtables bug: please report to author: bad policy 02:22:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, 0x0, 0x0) 02:22:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x0, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:08 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x1803000000000000, &(0x7f000000a000)) 02:22:08 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x5000, &(0x7f000000a000)) [ 2414.000179] rpcbind: RPC call returned error 22 [ 2414.000563] kernel msg: ebtables bug: please report to author: bad policy 02:22:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, 0x0, 0x0) 02:22:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x0, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2414.171912] kernel msg: ebtables bug: please report to author: bad policy [ 2415.378445] device bridge_slave_1 left promiscuous mode [ 2415.384009] bridge0: port 2(bridge_slave_1) entered disabled state [ 2415.437657] device bridge_slave_0 left promiscuous mode [ 2415.443254] bridge0: port 1(bridge_slave_0) entered disabled state [ 2415.543284] team0 (unregistering): Port device team_slave_1 removed [ 2415.559883] team0 (unregistering): Port device team_slave_0 removed [ 2415.572383] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2415.624027] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2415.715851] bond0 (unregistering): Released all slaves 02:22:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000000038000200000000000000030000000000000000000000000000000000000000040000000000"], 0x5b) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:11 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xb002, &(0x7f000000a000)) 02:22:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x0, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfb, 0x448000004}, 0x2a5) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x400, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x100, 0x0) r6 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f00000001c0)={0x0, 0x0, 0x200000000}) pwrite64(r6, &(0x7f0000000040)=';', 0x1, 0x40000) lseek(r6, 0x0, 0x80000000004) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4025030}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="83f22bbd7000fddbdf25030000000c0003000200000000000000080001000000000008000100000000000c00030006000000000000000c00070008000100", @ANYRES32=r2, @ANYBLOB="1c00070008000100", @ANYRES32=r3, @ANYBLOB="0800e6dc", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="0c0005000000000000000000"], 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x40001) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:22:11 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40000, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000140)) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f00000000c0)={0x20, ""/32}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) socket$inet(0x2, 0x0, 0x9) 02:22:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000000), 0x4) 02:22:12 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x48000000000000, &(0x7f000000a000)) [ 2417.272403] kernel msg: ebtables bug: please report to author: bad policy 02:22:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x0, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80800, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0xfffffffffffffff9) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000000000000000000400000008000c00", @ANYRES32=0x0], 0x1c}}, 0x0) [ 2417.458159] rpcbind: RPC call returned error 22 [ 2417.470826] rpcbind: RPC call returned error 22 [ 2417.488411] QAT: Invalid ioctl [ 2417.499621] kernel msg: ebtables bug: please report to author: bad policy [ 2417.517080] QAT: Invalid ioctl 02:22:12 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x1000000000000, &(0x7f000000a000)) 02:22:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x0, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:12 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xf00000000000000, &(0x7f000000a000)) [ 2417.623347] IPVS: ftp: loaded support on port[0] = 21 [ 2417.628803] rpcbind: RPC call returned error 22 [ 2417.743336] kernel msg: ebtables bug: please report to author: bad policy [ 2417.761177] rpcbind: RPC call returned error 22 [ 2417.771978] rpcbind: RPC call returned error 22 [ 2418.532474] bridge0: port 1(bridge_slave_0) entered blocking state [ 2418.540140] bridge0: port 1(bridge_slave_0) entered disabled state [ 2418.548915] device bridge_slave_0 entered promiscuous mode [ 2418.594461] bridge0: port 2(bridge_slave_1) entered blocking state [ 2418.601349] bridge0: port 2(bridge_slave_1) entered disabled state [ 2418.608946] device bridge_slave_1 entered promiscuous mode [ 2418.653213] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2418.700399] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2418.835694] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2418.882753] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2419.100713] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2419.108249] team0: Port device team_slave_0 added [ 2419.150456] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2419.158382] team0: Port device team_slave_1 added [ 2419.201889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2419.252529] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2419.301126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2419.350428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2419.357633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2419.375646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2419.840640] bridge0: port 2(bridge_slave_1) entered blocking state [ 2419.847077] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2419.853736] bridge0: port 1(bridge_slave_0) entered blocking state [ 2419.860138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2419.868151] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2420.337067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 02:22:15 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800"], 0x62) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) 02:22:15 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) 02:22:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x0, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:15 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x308, &(0x7f000000a000)) [ 2421.117471] kernel msg: ebtables bug: please report to author: bad policy [ 2421.124990] rpcbind: RPC call returned error 22 [ 2421.135659] rpcbind: RPC call returned error 22 [ 2421.780407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2421.950183] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2422.121985] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2422.128693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2422.138536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2422.310809] 8021q: adding VLAN 0 to HW filter on device team0 02:22:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000000), 0x4) 02:22:18 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3, &(0x7f000000a000)) 02:22:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x0, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c00f3ff210001000000000000000008000c00", @ANYRES32=0x0], 0x1c}}, 0x0) 02:22:18 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r1 = getpgid(r0) r2 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x6, 0x40001) fcntl$setown(r2, 0x8, r1) r3 = socket$inet(0x2, 0x0, 0x0) bind$inet(r3, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000180)={'ah\x00'}, &(0x7f00000001c0)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1400000000000001000000005a77105ec70000000000000080"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) [ 2423.477442] kernel msg: ebtables bug: please report to author: bad policy [ 2423.487432] rpcbind: RPC call returned error 22 [ 2423.496320] rpcbind: RPC call returned error 22 02:22:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000000), 0x4) 02:22:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x0, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2423.668671] kernel msg: ebtables bug: please report to author: bad policy 02:22:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000"], 0x65) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x26f) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000002220001009c5b562719951e2c0400000008000c00", @ANYRES32=0x0], 0x1c}}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x400040) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) 02:22:19 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x8c010000, &(0x7f000000a000)) 02:22:19 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80000, 0x0) accept4(r0, 0x0, &(0x7f00000000c0), 0x80800) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:19 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={'veth1_to_team\x00'}) 02:22:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x0, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2424.644112] kernel msg: ebtables bug: please report to author: bad policy 02:22:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x0, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:19 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x10000000, &(0x7f000000a000)) 02:22:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820f54c7beefeb5ba73590e50000000000200000", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x461) recvmsg$kcm(r1, &(0x7f0000000440)={0x0, 0xb906000000000000, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/57, 0x39}, {&(0x7f0000000200)=""/104, 0x7fffefc7}], 0x2}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") 02:22:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x400, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:22:19 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xf000000, &(0x7f000000a000)) [ 2424.817292] kernel msg: ebtables bug: please report to author: bad policy [ 2424.847562] rpcbind: RPC call returned error 22 [ 2424.860631] rpcbind: RPC call returned error 22 02:22:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x0, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2425.008058] rpcbind: RPC call returned error 22 [ 2425.034326] rpcbind: RPC call returned error 22 [ 2425.100132] kernel msg: ebtables bug: please report to author: bad policy 02:22:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000"], 0x65) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:22 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockname(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='hybla\x00', 0x6) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 02:22:22 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x700, &(0x7f000000a000)) 02:22:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x0, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x206, &(0x7f0000000040)="14318ebe5b") bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:22:22 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_getevents(r2, 0x734d3f40, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000200)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2427.308517] kernel msg: ebtables bug: please report to author: bad policy [ 2427.326867] rpcbind: RPC call returned error 22 [ 2427.345033] rpcbind: RPC call returned error 22 02:22:22 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfffffffffffff000, &(0x7f000000a000)) 02:22:22 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3f02000000000000, &(0x7f000000a000)) [ 2427.467900] kernel msg: ebtables bug: please report to author: bad policy 02:22:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:22 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x2000000000000000, &(0x7f000000a000)) [ 2427.601247] rpcbind: RPC call returned error 22 [ 2427.615742] rpcbind: RPC call returned error 22 [ 2427.623323] kernel msg: ebtables bug: please report to author: bad policy 02:22:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2427.743233] rpcbind: RPC call returned error 22 [ 2427.754725] rpcbind: RPC call returned error 22 [ 2427.777821] kernel msg: ebtables bug: please report to author: bad policy 02:22:24 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f8000000000000"], 0x67) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:24 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x42030000, &(0x7f000000a000)) 02:22:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x2e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x150, 0x178, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x338) 02:22:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=ANY=[]}, 0x1, 0x0, 0x0, 0x10000000000}, 0x0) dup3(r0, r0, 0x80000) 02:22:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1d"], 0x1) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000026c0)=[{{0x0, 0x1ab, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/110, 0x6e}}, {{&(0x7f0000001d80)=@sco, 0x80, &(0x7f0000002280), 0x97, &(0x7f0000002340)=""/114, 0x223}}], 0x2, 0x0, &(0x7f0000002840)={0x0, r1+10000000}) 02:22:24 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="140700001c0104ff203f00204001f8ffff000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:24 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x8cffffff, &(0x7f000000a000)) [ 2430.095208] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 2430.117731] kernel msg: ebtables bug: please report to author: bad policy 02:22:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x2e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x150, 0x178, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x338) 02:22:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x20000002, 0xffffffffffffff04) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x19600000, 0x210000) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) 02:22:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="220000002000070700be0000090007010a00001000003c0000ff040405000c008000", 0x22) [ 2430.267231] kernel msg: ebtables bug: please report to author: bad policy 02:22:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x2e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x150, 0x178, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x338) 02:22:25 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x23f, &(0x7f000000a000)) [ 2430.394062] kernel msg: ebtables bug: please report to author: bad policy 02:22:27 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:27 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:27 executing program 4: syz_emit_ethernet(0x46, &(0x7f0000000080)={@link_local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "adf122", 0x10, 0x2f, 0x0, @dev, @mcast2, {[], @icmpv6=@ni}}}}}, 0x0) 02:22:27 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x7402000000000000, &(0x7f000000a000)) 02:22:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = dup(r0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:22:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf617732743e397b89f26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040), 0xa) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000180)) [ 2432.580836] rpcbind: RPC call returned error 22 [ 2432.596690] kernel msg: ebtables bug: please report to author: bad policy [ 2432.605726] rpcbind: RPC call returned error 22 02:22:27 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xffffff8c, &(0x7f000000a000)) 02:22:27 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:27 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3c0, &(0x7f000000a000)) [ 2432.749224] kernel msg: ebtables bug: please report to author: bad policy 02:22:27 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x100000000000000, &(0x7f000000a000)) 02:22:27 executing program 4: clone(0x2102001fbc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x440, 0x41) ioctl$VT_DISALLOCATE(r0, 0x5608) r1 = gettid() r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe(&(0x7f0000bbc000)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000072ff8)={0x7fffffff}, 0x0, 0x8) dup2(r4, r3) io_setup(0x3, &(0x7f0000000000)=0x0) io_submit(r5, 0x1, &(0x7f0000000400)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000040)='n', 0x1}]) ioctl$EXT4_IOC_RESIZE_FS(r2, 0x40086610, &(0x7f0000000180)=0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x28) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x200000000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r7, &(0x7f0000000080), 0x1c) r8 = dup2(r7, r7) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x16, &(0x7f0000000440), 0x131f64) [ 2432.919690] rpcbind: RPC call returned error 22 [ 2432.936300] rpcbind: RPC call returned error 22 02:22:28 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000140)={r2, 0x1}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ip6gretap0\x00', 0x1110}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001c00fdff00000000000000080100000088983dfd0e0f764c862bd945aa81c2a03d5beea9870305b5f67fa46a63eebd266c0991dabaf56c31ab3096ab6ec226346664569086359c56627309322866ef74b894df15dd614f363b1534a22060128abfb0c73f0f2dd5f0c68c94b85348f094d49f1ee207df06afa03c864d48cc1aa692da9681781b68358d76b66fc205d731748009118599389994f49d9b3faa1d47e2e49d"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf617732743e397b89f26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040), 0xa) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f00000002c0)=ANY=[]], 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0xc020660b, &(0x7f0000000000)) 02:22:28 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3402000000000000, &(0x7f000000a000)) 02:22:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="a7693d2b61e6a51ae65cd252cee16e71e5b2810c2e8d82728cfe9e9f1c799fb8a3f02bafd272c02dee050a9d5c6d9df482dc9067e6a28b30feea2c6f8c0dae23ade2c7bf6580afee824472c6678eb89845aab4a9cdb3dcdb8c092168b5cb6d47b09a9a5dffa5efcc223939a3a5", 0x6d, 0x0) keyctl$invalidate(0x15, r1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:22:28 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) read(r2, 0x0, 0x23020000) [ 2433.440382] rpcbind: RPC call returned error 22 [ 2433.445636] kernel msg: ebtables bug: please report to author: bad policy [ 2433.478138] rpcbind: RPC call returned error 22 02:22:28 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x6001000000000000, &(0x7f000000a000)) [ 2433.630504] rpcbind: RPC call returned error 22 [ 2433.641708] rpcbind: RPC call returned error 22 02:22:30 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x108, 0x130, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x2f0) 02:22:30 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x200000000000000, &(0x7f000000a000)) 02:22:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x6, 0x800) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000001200)={{0x4, @addr=0x1ff}, 0x8, 0x5, 0xffe7}) write$P9_RREAD(r1, &(0x7f00000001c0)={0x100b, 0x75, 0x1, {0x1000, "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"}}, 0x100b) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000220000feffffff040000001f056b5bd75345228a0000000000000000"], 0x20}}, 0x100000000000) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x9, 0x0) connect$can_bcm(r2, &(0x7f0000000100), 0x10) 02:22:30 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001c00fdff000000006648acccdd0f0000000001000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040)=0x7, 0x4) 02:22:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@ipv4={[], [], @multicast1}, @mcast1, @ipv4={[], [], @dev}, 0x0, 0x0, 0x200, 0x1c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) ptrace$cont(0x21, r1, 0x0, 0x0) 02:22:30 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x8000000, &(0x7f000000a000)) [ 2435.800580] rpcbind: RPC call returned error 22 [ 2435.808938] kernel msg: ebtables bug: please report to author: bad policy [ 2435.817280] rpcbind: RPC call returned error 22 02:22:30 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xc0fe, &(0x7f000000a000)) 02:22:30 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000080)={0x0, {{0x2, 0x4e24, @multicast1}}}, 0x88) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$apparmor_exec(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="737461636b2066696c74bdf80cb8ee78657200"], 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) readahead(0xffffffffffffffff, 0x0, 0x19) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = memfd_create(&(0x7f0000000380), 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x58) ftruncate(r4, 0x1000000) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="3500000003000000000000000000000006000000000000001400000000000000406574683176626f786e6574302d276e6f64657600ffb723ed7f47737c491009d2729791955abcc7004e339c6be96643b0376e788f36550a2b93d47b20e078f2f5f47510fa2171f7b9a1f923ba081378a5af77f5a24fa36af443948bfce3ea0fcbcf3efc4e395ef9dd7a3392a6a80a0c013018bdd3ff0c7ab76a1750dd61526c4d57ec2c944c1d9e682d47899efac5b87dda05006f34c843030d1f876bea711ed40ee04e139ac19f55b572bb6f6c1c53fa8e7cbca811504f11c1e251df4b6b"], 0xdf) sendfile(r3, r4, 0x0, 0xfffffdef) [ 2435.899918] rpcbind: RPC call returned error 22 [ 2435.907522] rpcbind: RPC call returned error 22 02:22:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x108, 0x130, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x2f0) 02:22:30 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x20000) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000180)={0x7, &(0x7f0000000140)=[{0x1, 0x0, 0x4, 0x7}, {0x9b, 0x4, 0x2, 0x2}, {0x0, 0x80000001, 0x4, 0x5}, {0x2, 0x1, 0x3be984f9, 0x5}, {0x3, 0x10001, 0x5, 0x3}, {0x4, 0x9, 0x2, 0x3}, {0x6, 0xffffffff, 0x1, 0x1000}]}, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:22:30 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/userio\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x80, 0x85) timerfd_settime(r2, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000340)={0x0, 0xfffffffffffffff9}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000003c0)={r3, @in6={{0xa, 0x4e24, 0x18587b62, @remote, 0x3}}}, 0x84) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="140086000000fdff000000000000000001000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x80000001, 0x200100) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x13, "0bef73a4c2196d65e53e247ca583626224d29c"}, &(0x7f0000000280)=0x1b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000002c0)={r5, 0x32e9f8aa}, 0x8) [ 2436.054999] kernel msg: ebtables bug: please report to author: bad policy 02:22:33 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:33 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3f000000, &(0x7f000000a000)) 02:22:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x108, 0x130, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x2f0) 02:22:33 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) r1 = request_key(&(0x7f0000000040)='logon\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='[\x00', 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000001780)='keyring\x00', &(0x7f00000017c0)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, r1, &(0x7f0000001700)=[{&(0x7f0000000140)="c3b0d10eb857a3f5079347fbce35aa3bf57e570846d8e798f8e493ae6a073c1bb3274218890d6d487bd5eed8c0afaa267a5a44aa7958a52afcd8e19220ce69b6bb34ae5e1367421273431eec19368bf0163bbc982d5992a96d11f9216fce346990208028c367ab21fc52cd1a1b0145a2739a0ef4299a42bdd7acd3fc4ae8ae153c1c193fce2da50e84b35f37bcd4448a1a002615523c1a590cd85ee6ca55dc132d510d6edaa984811a7d6b97b93edf810a2a6989597db35b5686f799277e4e4886cc338d", 0xc4}, {&(0x7f0000000280)="04e7d964c842add7e21b82007bb92a21c49defa0e67bb665488babc16e50653526ef4e147bd95861256b664eed8f5046012233a60e08a3fa360a0856b69b3700e4da777570773f343245c06a37c376dc72d892fcc8067fbb4bacb812190e81656b1ed653631a29303a90088e8bc456", 0x6f}, {&(0x7f0000000300)="8af00c48d6a6c11b87090ab9377cfa186877fc24c6c1168ad56ed5fd6041d728531a9fa975ef3cc7e78cea6741a8761d6f14ca1d3c6b5ac173701675a1ef5a69d53d33fcb56943d79786824c531a8946551f87690500d2debf0638df9da67e04cbd765421175ab00fe8a0ab0e3349021c3faa581f6e8ee84dfc8efee225f2cce72f82f816d07f28cfa9e0d4c72eb184094ab743fabe0b16c5968b502ed92b5a1f762d2a8763651d493fb0fb899d2442f3fa1c5a76e36e3e80130148f5e777f692018dda2c684", 0xc6}, {&(0x7f0000000400)="709565d5722ad95a48999e9f6286596aa81e60128b22f55bc98e73ba3bd42ce073e5b94b8c7ec9f2f30c9c7474e493ff9f42c1beba44bd94d97a50bf8a8503e55f453dd1da83e429764b2499441cbc9f6b616545b849ce46d690e4388a84c75be3272ca056486b704fe8d454b1e5bb1ff0d3c24edaa05ab01d7ed25a571f82048bfa24e2ea6a2f58aefee2a7dce39d1b42ffdaf1", 0x94}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="6d137bc33b1e68b68e16e4f4dd35e5a3fcd14b10a7c08f8e11d5c8bb5e", 0x1d}, {&(0x7f0000001500)="f7728d7db87eaa2e95cb8f8a8164e49d2ae6554050dd3528607ae8cc416278d6cada5fabc108c8583b1da7623b7d9baf8628874cea29d9d1af74e428579c7566d1ca468adbd15686d97efed92ffaffc761ae3ddbad40b215cb4a37206641eb6d06d7f42b8886ddaf533d73a02557b70018369c47eb298ebed5efdbe75d83b5c1a46dd5510dfe28347334f251027203205ef0ff24df148e7709a406d7b56f7cbc79682d95671d7cfe010d1c8ec2a1320d973b476c8cc0a873b57649ba78789fb99bedbf0d190a25f6ea0873cdd195b71e29bd94945975c145f7874d", 0xdb}, {&(0x7f0000001600)="925d8784e8f11b7991bffcc8634173adfacbd6a6fafa287768b0d890d293abd3d3", 0x21}, {&(0x7f0000001640)="4df14b171fd2ca7fb2f03035f44737a4bcbe562b3eb48d81f192d4e44f289fb2ca297a0a559c1a0ec42aa6f25a7f4a66aaa46b1d098ab1fd0d5f64b964b2b2e2f97f1371bce4d630bae7b4d819c44409141d575e87df7456342b96aba4866d3989f1476834ffdddc7e9063c05fb79256468efff81b1b785ea44a34aaeb4ca73c87896720065b078f3f01dfdd5c82b7fc63972eca306d63fb01ded097c8a51f9181147d4438cfd2486fb7fbff6f4665eb25", 0xb1}], 0x9, r2) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001880)={r0}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000002900)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x8}}, 0x74, 0x4}, &(0x7f00000029c0)=0x88) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000002a00)={r5, 0x4}, &(0x7f0000002a40)=0x8) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001800)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SG_SET_DEBUG(r6, 0x227e, &(0x7f0000001840)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000028c0)=0x869, 0xfffffffffffffe50) sysinfo(&(0x7f00000018c0)=""/4096) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="140000001c00fdffed0000000000000001000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:33 executing program 2: bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x40000) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x27d) 02:22:33 executing program 4: r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x1}, 0x1c) 02:22:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000140)={@mcast2, 0x0}, &(0x7f0000000180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f00000002c0)=0xe8) accept4(r0, &(0x7f0000000300)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000380)=0x80, 0x800) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000001b00)={@local, 0x0}, &(0x7f0000001b40)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000001b80)={@multicast1, @rand_addr, 0x0}, &(0x7f0000001bc0)=0xc) getsockname(r0, &(0x7f0000001c00)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000001c80)=0x80) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001cc0)={'ipddp0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001d40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001d80)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001ec0)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@loopback}}, &(0x7f0000001fc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002000)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000002100)=0xe8) recvmmsg(r0, &(0x7f0000008c80)=[{{&(0x7f0000002140)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000033c0)=[{&(0x7f00000021c0)=""/236, 0xec}, {&(0x7f00000022c0)=""/22, 0x16}, {&(0x7f0000002300)=""/121, 0x79}, {&(0x7f0000002380)=""/4096, 0x1000}, {&(0x7f0000003380)=""/10, 0xa}], 0x5, &(0x7f0000003400)=""/53, 0x35, 0x4}, 0x100000001}, {{&(0x7f0000003440)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000003640)=[{&(0x7f00000034c0)=""/164, 0xa4}, {&(0x7f0000003580)=""/153, 0x99}], 0x2, &(0x7f0000003680)=""/4096, 0x1000, 0x4}, 0x2}, {{0x0, 0x0, &(0x7f0000004a40)=[{&(0x7f0000004680)=""/173, 0xad}, {&(0x7f0000004740)=""/228, 0xe4}, {&(0x7f0000004840)=""/238, 0xee}, {&(0x7f0000004940)=""/253, 0xfd}], 0x4, 0x0, 0x0, 0x200}, 0x80}, {{0x0, 0x0, &(0x7f0000004e00)=[{&(0x7f0000004a80)=""/195, 0xc3}, {&(0x7f0000004b80)=""/134, 0x86}, {&(0x7f0000004c40)=""/31, 0x1f}, {&(0x7f0000004c80)=""/231, 0xe7}, {&(0x7f0000004d80)=""/98, 0x62}], 0x5, 0x0, 0x0, 0xfffffffffffffffb}, 0x80000000}, {{&(0x7f0000004e40)=@nl=@proc, 0x80, &(0x7f0000005000)=[{&(0x7f0000004ec0)=""/12, 0xc}, {&(0x7f0000004f00)=""/147, 0x93}, {&(0x7f0000004fc0)=""/46, 0x2e}], 0x3, &(0x7f0000005040)=""/77, 0x4d, 0x1}, 0x87d}, {{&(0x7f00000050c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000005140)=""/70, 0x46}], 0x1, 0x0, 0x0, 0x7fff}, 0x4}, {{&(0x7f0000005200)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000005780)=[{&(0x7f0000005280)=""/104, 0x68}, {&(0x7f0000005300)=""/146, 0x92}, {&(0x7f00000053c0)=""/1, 0x1}, {&(0x7f0000005400)=""/225, 0xe1}, {&(0x7f0000005500)=""/103, 0x67}, {&(0x7f0000005580)=""/186, 0xba}, {&(0x7f0000005640)}, {&(0x7f0000005680)=""/220, 0xdc}], 0x8, &(0x7f00000057c0)=""/4096, 0x1000, 0x6}, 0x6}, {{&(0x7f00000067c0)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000006a40)=[{&(0x7f0000006840)=""/89, 0x59}, {&(0x7f00000068c0)=""/159, 0x9f}, {&(0x7f0000006980)=""/186, 0xba}], 0x3, &(0x7f0000006a80)=""/4096, 0x1000, 0x2}, 0x6}, {{&(0x7f0000007a80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000007c40)=[{&(0x7f0000007b00)=""/63, 0x3f}, {&(0x7f0000007b40)=""/105, 0x69}, {&(0x7f0000007bc0)=""/79, 0x4f}], 0x3, &(0x7f0000007c80)=""/4096, 0x1000, 0x3}, 0x480}], 0x9, 0x40002020, &(0x7f0000008dc0)={0x77359400}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000008e00)={0x0, @empty, @broadcast}, &(0x7f0000008e40)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000008f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008f80)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000008fc0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000009000)={'team0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000009040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000009080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009100)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4}}, &(0x7f0000009200)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009280)={0x0, @multicast2, @loopback}, &(0x7f00000092c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000009300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000009340)=0x14, 0x80000) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000009380)={0x0, @empty}, &(0x7f00000093c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000009600)={'ip6_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000009640)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009680)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000009780)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000009940)=0x14) clock_gettime(0x0, &(0x7f000000bdc0)={0x0, 0x0}) recvmmsg(r0, &(0x7f000000bd80)=[{{&(0x7f0000009980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f000000bd00)=[{&(0x7f0000009a00)=""/139, 0x8b}, {&(0x7f0000009ac0)=""/26, 0x1a}, {&(0x7f0000009b00)=""/192, 0xc0}, {&(0x7f0000009bc0)=""/4096, 0x1000}, {&(0x7f000000abc0)=""/180, 0xb4}, {&(0x7f000000ac80)=""/3, 0x3}, {&(0x7f000000acc0)=""/4096, 0x1000}, {&(0x7f000000bcc0)=""/26, 0x1a}], 0x8, &(0x7f000000bd40)=""/48, 0x30}}], 0x1, 0x20, &(0x7f000000be00)={r28, r29+10000000}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000bf80)={0x0, @empty, @empty}, &(0x7f000000bfc0)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000c880)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20200000}, 0xc, &(0x7f000000c840)={&(0x7f000000c000)={0x80c, r1, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0x134, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x134, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0xe8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x32}}}]}}, {{0x8, 0x1, r13}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x69}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0x12c, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r15}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x10000, 0x0, 0x7, 0x4}]}}}]}}, {{0x8, 0x1, r17}, {0xc4, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}]}}, {{0x8, 0x1, r19}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}]}}, {{0x8, 0x1, r21}, {0xb8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffeffff}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r23}}}]}}, {{0x8, 0x1, r24}, {0x134, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r25}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r30}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r31}}}]}}]}, 0x80c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 2438.545416] kernel msg: ebtables bug: please report to author: bad policy [ 2438.567881] rpcbind: RPC call returned error 22 [ 2438.604268] rpcbind: RPC call returned error 22 02:22:33 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000080)={0x0, {{0x2, 0x4e24, @multicast1}}}, 0x88) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$apparmor_exec(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="737461636b2066696c74bdf80cb8ee78657200"], 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) readahead(0xffffffffffffffff, 0x0, 0x19) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = memfd_create(&(0x7f0000000380), 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x58) ftruncate(r4, 0x1000000) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000000)=0x44) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="3500000003000000000000000000000006000000000000001400000000000000406574683176626f786e6574302d276e6f64657600ffb723ed7f47737c491009d2729791955abcc7004e339c6be96643b0376e788f36550a2b93d47b20e078f2f5f47510fa2171f7b9a1f923ba081378a5af77f5a24fa36af443948bfce3ea0fcbcf3efc4e395ef9dd7a3392a6a80a0c013018bdd3ff0c7ab76a1750dd61526c4d57ec2c944c1d9e682d47899efac5b87dda05006f34c843030d1f876bea711ed40ee04e139ac19f55b572bb6f6c1c53fa8e7cbca811504f11c1e251df4b6b"], 0xdf) sendfile(r3, r4, 0x0, 0xfffffdef) 02:22:33 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x6c, &(0x7f000000a000)) 02:22:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x0, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:33 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xffffffff00000000, &(0x7f000000a000)) [ 2438.810897] kernel msg: ebtables bug: please report to author: bad policy 02:22:33 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfe000000, &(0x7f000000a000)) [ 2438.905808] rpcbind: RPC call returned error 22 02:22:36 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x0, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:36 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3e00, &(0x7f000000a000)) 02:22:36 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x9, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0x1, 0x7, 0x0, 0x2, 0x4fbbbbe0, 0xfff, 0x6, 0x0, 0x5, 0x2, 0xc479, 0xffffffffffffff72, 0x8001, 0x6, 0x1b, 0x1}}) 02:22:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 02:22:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) clone(0x40000000, &(0x7f0000000100)="0306b38c3aa93e1b3ea76c728f72c632f660cbb8a32641116624e3c676726622dc530f5a2a2be9f8e5dbc5cc938bc9a60a62b7002b89844823acc0cfa9a67b271bf5352de6479da4507138469ea3106a527ea85d3207ade6e4f7f7ed2de481b3e20f82015ff338e76ab477cafb589aeb7993bd4bda6c27d8227ade47a8c4", &(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)="decdff1dee490e9cbffda92749c2e6d6bab9af11c6243de14c7ed600dc9da38fcfa4c5243b025196885e0ccf3e2304de465e2b4438147f27dd") setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:22:36 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x74, &(0x7f000000a000)) [ 2441.435303] kernel msg: ebtables bug: please report to author: bad policy [ 2441.471281] IPVS: ftp: loaded support on port[0] = 21 02:22:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x0, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:36 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x0, &(0x7f0000000140)}, 0x10) 02:22:36 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x8c01000000000000, &(0x7f000000a000)) [ 2441.670811] kernel msg: ebtables bug: please report to author: bad policy 02:22:36 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000000c0)) 02:22:36 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xff03, &(0x7f000000a000)) [ 2441.829799] rpcbind: RPC call returned error 22 [ 2442.142828] IPVS: ftp: loaded support on port[0] = 21 02:22:39 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x0, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:39 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f000074fffc)=0x3, 0x348) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000840)=0x3eb5, 0x4) sendto$inet6(r0, &(0x7f0000e77fff), 0x0, 0x20000008, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fbf) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 02:22:39 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x10, &(0x7f000000a000)) 02:22:39 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001c00fdff0000000000000000570000009a993a937023a54f221fe0afc0eb6e57ab8709b7cb8250a7d4dabe0d2a6a8957b0f08373515d2b84ac2874289dbd690647792418"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) socket$unix(0x1, 0x2, 0x0) [ 2444.755282] kernel msg: ebtables bug: please report to author: bad policy [ 2444.790947] rpcbind: RPC call returned error 22 02:22:39 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x5, &(0x7f000000a000)) [ 2444.802288] rpcbind: RPC call returned error 22 02:22:39 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:22:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x0, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='coredump_filter\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_int(r0, &(0x7f0000000000), 0x12) 02:22:39 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x6c00000000000000, &(0x7f000000a000)) [ 2444.936896] rpcbind: RPC call returned error 22 [ 2444.959333] kernel msg: ebtables bug: please report to author: bad policy 02:22:39 executing program 4: syz_execute_func(&(0x7f0000000140)="cd8075fcb0b042e376c4017d50ee8adcc4c23dbf2c1a1192000880410fd1b0b5d90000797c2a0f0ff0cdcde3a95fd965eae23c3b4d4ddfdf400f01efe5e59d7d2f0f43113e1a63460fc4c161fccddfdef731") syz_execute_func(&(0x7f0000000140)="cd80c20000b0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b02db5d90000007cc481c653fb0fcdc4e3a95fd965eabe3c3b4d4d408064797f41dfdf400e01efc4a1fd28d29d7d2f67450f483b1c0a1a63460fc4c161fc4d96040476789f") 02:22:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x0, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2445.045418] rpcbind: RPC call returned error 22 02:22:39 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xf5ffffff, &(0x7f000000a000)) [ 2445.171990] kernel msg: ebtables bug: please report to author: bad policy 02:22:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x0, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:40 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xf00, &(0x7f000000a000)) [ 2445.369090] kernel msg: ebtables bug: please report to author: bad policy 02:22:40 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x101000, 0x0) fchmodat(r1, &(0x7f0000000140)='./file0\x00', 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x2, 0x4, 0x1, 0x39f}, 0x14) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f00000001c0)={0x400000000000000, 0x100000, 0x80000000, 0x1, 0xb}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+'}, 0x28, 0x2) 02:22:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000001000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000f46000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) readv(r2, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/214, 0x99}, {&(0x7f0000000140)=""/181, 0x2a5}], 0x2) 02:22:40 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3e00000000000000, &(0x7f000000a000)) [ 2445.662989] rpcbind: RPC call returned error 22 02:22:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 02:22:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x0, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:42 executing program 2: prctl$PR_GET_SECUREBITS(0x1b) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x84000) write$P9_RMKNOD(r1, &(0x7f0000000300)={0x14, 0x13, 0x1, {0x4, 0x3, 0x2}}, 0x14) ioctl(r0, 0xfffffffffffffffa, &(0x7f0000000180)="1385787b6b28144dcc50c9842dcc1b06df5a329c0e90145b5d84ba21e2ed96c5de5da5edcc643d26c56096156ebb4fc01ab742701449972549b733a05f2ab78ebd63e50781ce8d157cd6d05fe0306fcdeaa2db8ca5a4aad440aeb785e454e054a3d7924d2147dda2983ebaf4a1f57fac3542e4fe977f5ac2583490cd6efdffe16f0326c905a26ed80729c4835d8f90e7d744b35ef51bbf706a8c14a030156d42b7e7b9e4ff92f5e262ad1d885edb0d90bfee8d40bd96c0cbd934ec5f4eef1b06ac1f9c6f182e11af978fe6770a0c7717baff62dfcf461666baf63eee9a059ba439538ffe783853be214722c1073a1a941e922a0a7c48d5b20c") r2 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000280)=0x5, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_cache\x00') openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f0000000100)={0x1, 0x9, [{0xccde, 0x0, 0xba4d}]}) 02:22:42 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x4000000000000, &(0x7f000000a000)) 02:22:42 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x800000001) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mmap(&(0x7f0000321000/0x4000)=nil, 0x4000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/155) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x1, 0x2a, &(0x7f0000000040)="dc5567180c5a8568d5b90618abeae354d1b28f6e402be278e4ccc5c45012ca6ce2087fb4c3e3ec64b0a5"}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:22:42 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x11d, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) [ 2448.100350] rpcbind: RPC call returned error 22 [ 2448.109999] kernel msg: ebtables bug: please report to author: bad policy 02:22:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x0, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 02:22:42 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x2e00000000000000, &(0x7f000000a000)) 02:22:43 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x7a00000000000000, &(0x7f000000a000)) [ 2448.262795] kernel msg: ebtables bug: please report to author: bad policy [ 2448.289940] rpcbind: RPC call returned error 22 02:22:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2448.424395] rpcbind: RPC call returned error 22 [ 2448.449092] kernel msg: ebtables bug: please report to author: bad policy 02:22:43 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfa03000000000000, &(0x7f000000a000)) 02:22:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2448.581970] rpcbind: RPC call returned error 22 02:22:43 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x600, &(0x7f000000a000)) [ 2448.667508] kernel msg: ebtables bug: please report to author: bad policy [ 2448.688300] rpcbind: RPC call returned error 22 02:22:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) lseek(r0, 0x0, 0x3) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000040)={0x20, 0x101, 0x1000, 0xffffffff}, 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) connect$pptp(r1, &(0x7f0000000100)={0x18, 0x2, {0x1, @multicast1}}, 0x1e) 02:22:43 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x6, &(0x7f000000a000)) [ 2449.289170] rpcbind: RPC call returned error 22 02:22:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2c0000002900010000001119c78d000001000000180000000c41000000000014000000000000ffffac1414bb"], 0x1}}, 0x0) 02:22:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:22:44 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) [ 2449.679977] kernel msg: ebtables bug: please report to author: bad policy 02:22:46 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 02:22:46 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xcc03000000000000, &(0x7f000000a000)) 02:22:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffd36, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c00000022000000000100000000000000", @ANYRES32=0x0], 0x1c}}, 0x0) 02:22:46 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d024031ae85717070") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r1, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c1340643", 0x92) sendfile(r1, r1, &(0x7f0000000240), 0x8000) 02:22:46 executing program 4: syz_emit_ethernet(0x42, &(0x7f0000000100)={@remote, @link_local, [], {@arp={0x6558, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @empty, @remote, @empty, @mcast2}}}}, &(0x7f0000000180)={0x0, 0x4, [0x0, 0x6b8]}) 02:22:46 executing program 0: r0 = socket$inet(0x2, 0x0, 0xfffffffffffffffc) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0031ee37bf5774276008a711edd947c98aa09ba404dc826d88d387c880986adc6f7eee7ce1888b93dc17de257208489007bd4373688f2f1b2e41f9060a460eef40c94f5a0000000000000000000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:46 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="180000ff0100000000000080"], 0xc}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) 02:22:46 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) [ 2451.624987] rpcbind: RPC call returned error 22 02:22:46 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmmsg(r0, &(0x7f000000bc80)=[{{&(0x7f0000000100)=@can={0x1d, r1}, 0x80, 0x0, 0x0, &(0x7f00000006c0)=[{0xc}], 0xc, 0x20000000}, 0xffffffffffffff7f}], 0x1, 0x0) 02:22:46 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="dffeffff3000fdff0000000004000000010000006857380f86b76189be5774c5b9032bc8de2fa63530881b3aa72412ec11690fe7532aefb5"], 0x3c}, 0x1, 0x800000000000000}, 0x2) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:46 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x2000000, &(0x7f000000a000)) 02:22:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x963, 0x8000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r2}}, 0x18) r3 = syz_open_dev$ndb(&(0x7f00000003c0)='/dev/nbd#\x00', 0x0, 0x20280) ppoll(&(0x7f0000000400)=[{r3, 0x3080}, {r1, 0x5000}, {r1, 0x400}, {r0, 0x1000}, {r1, 0x2}, {r0, 0x80}, {r0, 0x400}, {r0, 0x384}], 0x8, &(0x7f0000000480), &(0x7f0000000500)={0x941}, 0x8) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:22:46 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 02:22:46 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x80044dfe, &(0x7f00000001c0)) [ 2451.964360] input: syz1 as /devices/virtual/input/input54 02:22:46 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="140000001c00fdff004000000000000001000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000900)={0x0, 0x2, 0x0, 0x0, &(0x7f0000000880)=[{}, {}]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x331) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2452.017861] input: syz1 as /devices/virtual/input/input55 02:22:47 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000b00], 0x7, 0x0, &(0x7f0000000b00)=[{0x4, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {}]}, 0xe0) 02:22:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 02:22:47 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x400000000000005, 0x8f, 0x6, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x3, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) [ 2453.268528] device bridge_slave_1 left promiscuous mode [ 2453.274080] bridge0: port 2(bridge_slave_1) entered disabled state [ 2453.327761] device bridge_slave_0 left promiscuous mode [ 2453.333273] bridge0: port 1(bridge_slave_0) entered disabled state [ 2453.433343] team0 (unregistering): Port device team_slave_1 removed [ 2453.445985] team0 (unregistering): Port device team_slave_0 removed [ 2453.462163] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2453.513927] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2453.605490] bond0 (unregistering): Released all slaves 02:22:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 02:22:50 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000440)={0x7}, 0xc) 02:22:50 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:22:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000100)={0x1, 0x401}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000180)={0x0, 0xff, 0x7, &(0x7f0000000140)=0x3}) 02:22:50 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfe030000, &(0x7f000000a000)) 02:22:50 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x0, 0x0}, 0xff6c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:50 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r2, 0x0, 0x7, &(0x7f0000000300)='eth1#}\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50, &(0x7f0000000440)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r3, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xd2, 0x0, &(0x7f0000000780)="0a71f75566cf71b6c5c98a60a03eaa739ecb9a37e7e5949c5fd155bd4da972f4c92c592a12a18ef7c0804f02f1df2dbe9f2e054da0d89f5eb4ec35965e129fdb99603dc340981cb33c42d614f6d771897d1e17d498dbc42a008bd4155dffc42fa834de53bb5614d144f57dde5203e14d0830b7d646cbf2463404b2bf8ab93ac7fdd30c6fc10b720642783ddb9765a83f6f640969e34359c7a38c1a9085440a0e0d645a94891312a4fd2120d6e2e0c7e8d9be7a1669e6300898863d82fd74003daeb08789757cfa210e180ded71bf99325aaa", 0x0, 0x6}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000340)='GPL\x00'}, 0x48) 02:22:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003e40)={&(0x7f0000001500)=@xdp={0x2c, 0x2, 0x0, 0x28}, 0x80, &(0x7f00000039c0), 0x0, &(0x7f0000003a80)}, 0x40000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r2, 0x0, 0x7, &(0x7f0000000300)='eth1#}\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50, &(0x7f0000000440)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r3, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xd2, 0x0, &(0x7f0000000780)="0a71f75566cf71b6c5c98a60a03eaa739ecb9a37e7e5949c5fd155bd4da972f4c92c592a12a18ef7c0804f02f1df2dbe9f2e054da0d89f5eb4ec35965e129fdb99603dc340981cb33c42d614f6d771897d1e17d498dbc42a008bd4155dffc42fa834de53bb5614d144f57dde5203e14d0830b7d646cbf2463404b2bf8ab93ac7fdd30c6fc10b720642783ddb9765a83f6f640969e34359c7a38c1a9085440a0e0d645a94891312a4fd2120d6e2e0c7e8d9be7a1669e6300898863d82fd74003daeb08789757cfa210e180ded71bf99325aaa", 0x0, 0x6}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000340)='GPL\x00'}, 0x48) 02:22:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003e40)={&(0x7f0000001500)=@xdp={0x2c, 0x2, 0x0, 0x28}, 0x80, &(0x7f00000039c0), 0x0, &(0x7f0000003a80)}, 0x40000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50, &(0x7f0000000440)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xd2, 0x0, &(0x7f0000000780)="0a71f75566cf71b6c5c98a60a03eaa739ecb9a37e7e5949c5fd155bd4da972f4c92c592a12a18ef7c0804f02f1df2dbe9f2e054da0d89f5eb4ec35965e129fdb99603dc340981cb33c42d614f6d771897d1e17d498dbc42a008bd4155dffc42fa834de53bb5614d144f57dde5203e14d0830b7d646cbf2463404b2bf8ab93ac7fdd30c6fc10b720642783ddb9765a83f6f640969e34359c7a38c1a9085440a0e0d645a94891312a4fd2120d6e2e0c7e8d9be7a1669e6300898863d82fd74003daeb08789757cfa210e180ded71bf99325aaa", 0x0, 0x6}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000340)='GPL\x00'}, 0x48) 02:22:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1283) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x50) 02:22:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000040c0), 0x1000) statfs(&(0x7f0000000680)='./file0/file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_STATFS(r0, &(0x7f0000000340)={0x60, 0x0, 0x2}, 0x60) [ 2455.719368] IPVS: ftp: loaded support on port[0] = 21 02:22:50 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000500)=""/89, 0x4}, {&(0x7f0000000580), 0xfc5d}, {&(0x7f00000005c0)=""/81, 0x51}, {&(0x7f0000000640)=""/232, 0xe8}], 0x1000000000000030, 0x0) [ 2456.882709] bridge0: port 1(bridge_slave_0) entered blocking state [ 2456.889273] bridge0: port 1(bridge_slave_0) entered disabled state [ 2456.896990] device bridge_slave_0 entered promiscuous mode [ 2456.943123] bridge0: port 2(bridge_slave_1) entered blocking state [ 2456.949650] bridge0: port 2(bridge_slave_1) entered disabled state [ 2456.957145] device bridge_slave_1 entered promiscuous mode [ 2457.002301] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2457.047520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2457.182897] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2457.231496] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2457.445769] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2457.453604] team0: Port device team_slave_0 added [ 2457.496118] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2457.504556] team0: Port device team_slave_1 added [ 2457.549113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2457.597918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2457.645398] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2457.652585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2457.672422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2457.712392] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2457.719865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2457.738775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2458.214288] bridge0: port 2(bridge_slave_1) entered blocking state [ 2458.220728] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2458.227409] bridge0: port 1(bridge_slave_0) entered blocking state [ 2458.233770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2458.242335] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2458.606826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 02:22:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x30b, &(0x7f0000000440)={&(0x7f0000000100)={0x16, 0x30, 0x4, 0x0, 0x25dfdbfe, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0xfffffffffffffdc9}, 0x1, 0x0, 0x0, 0x100}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20040, 0x0) getpeername$netlink(r1, &(0x7f0000000140), &(0x7f0000000180)=0xc) 02:22:54 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r3 = request_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\\\x00', 0xfffffffffffffffe) keyctl$reject(0x13, r2, 0x9, 0x401, r3) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:54 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sched_setscheduler(0x0, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 02:22:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() waitid(0x0, 0x0, 0x0, 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0x0, 0x20008005, 0x0, 0x0) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000019c0)={{{@in=@remote, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000001ac0)=0xe8) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739c9d, 0x120, 0x0, 0xfffffffffffffe54) fcntl$getown(0xffffffffffffffff, 0x9) [ 2459.901824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2460.005182] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2460.108713] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2460.114877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2460.123473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2460.221599] 8021q: adding VLAN 0 to HW filter on device team0 02:22:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0) 02:22:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000de1fff), 0x0, 0x20008005, 0x0, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739c9d, 0x120, 0x0, 0xfffffffffffffe54) 02:22:55 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfe80, &(0x7f000000a000)) 02:22:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x2, &(0x7f0000000100)=""/9, &(0x7f0000000140)=0x9) 02:22:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0x0, 0x0) close(r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) sendfile(r1, r2, 0x0, 0x100000001) syz_open_procfs(0x0, 0x0) 02:22:55 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb76, 0x2}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) bind$alg(r1, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc-aes-aesni\x00'}, 0x58) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="67b4763a3f4622624f7d2ebf77a574a660961939c87ebd8fcf23e3d0b23087865be4272a3819f97901c01f0f225191265870da838cfd1f848206988251e96deb3e44a247d6f21d989af1417260de3ab1dec096b85310c6b4699fcbd8f9ed07690fd2d1c8c740c841739f89a3d023375ed3bf6f8aa49a"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/exec\x00', 0x2, 0x0) 02:22:55 executing program 3: 02:22:55 executing program 1: 02:22:55 executing program 4: 02:22:55 executing program 3: 02:22:55 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xf000, &(0x7f000000a000)) 02:22:55 executing program 1: 02:22:55 executing program 4: 02:22:55 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x2e00, &(0x7f000000a000)) 02:22:55 executing program 1: 02:22:55 executing program 0: bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$swradio(&(0x7f0000000380)='/dev/swradio#\x00', 0x0, 0x2) write$P9_RLERRORu(r1, &(0x7f0000000300)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r1, @ANYRESHEX], 0xfffffffffffffdf1) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000780)=ANY=[@ANYBLOB="000000000a004e2200000080fe8000000000000000000000000000aa080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000050000000a004e220000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2306000000fe8000000000000000000000000000bb04000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2305000000fe80000000000000000000000000000dff0f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2409000000ff02000000000000000000000000000104000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2383010000000000000000000000000000000000010000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x30c) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) readahead(r1, 0x2, 0x1) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0245720, &(0x7f0000000500)={0x1, {r2, r3+30000000}, 0x1, 0x80}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) fcntl$dupfd(r1, 0x406, r0) r6 = getuid() stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bind(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}, 0x1, 0x3, 0x0, 0x3}}, 0x80) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r4}, {0x2, 0x4, r5}, {0x2, 0x0, r6}], {0x4, 0x1}, [{0x8, 0x2, r7}], {0x10, 0x2}, {0x20, 0x2}}, 0x44, 0x3) ioctl$KVM_DIRTY_TLB(r1, 0x400caeaa, &(0x7f0000000040)={0x3f, 0x1}) 02:22:56 executing program 1: 02:22:56 executing program 3: 02:22:56 executing program 4: 02:22:56 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x8, &(0x7f000000a000)) 02:22:56 executing program 4: [ 2461.603740] rpcbind: RPC call returned error 22 02:22:56 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x9c03000000000000, &(0x7f000000a000)) 02:22:56 executing program 1: 02:22:56 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f00000000c0)={0x7}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x0, 0x0}, 0x5344e599) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) [ 2461.644554] rpcbind: RPC call returned error 22 02:22:56 executing program 3: 02:22:56 executing program 3: 02:22:56 executing program 1: [ 2461.853826] rpcbind: RPC call returned error 22 [ 2461.865245] rpcbind: RPC call returned error 22 02:22:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000220001000000000000000000040c00", @ANYRES32=0x0], 0x1c}}, 0x0) 02:22:56 executing program 4: 02:22:56 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xf8, &(0x7f000000a000)) 02:22:56 executing program 1: 02:22:56 executing program 3: 02:22:56 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xff000000, &(0x7f000000a000)) 02:22:57 executing program 3: 02:22:57 executing program 1: [ 2462.281809] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 02:22:57 executing program 0: r0 = socket$inet(0x2, 0x0, 0x800) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x400082, 0x0) connect$vsock_stream(r1, &(0x7f00000001c0)={0x28, 0x0, 0xffffffff}, 0x10) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="140000101c00fdff000000000000000001000000"], 0x1}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000140)=0x1008000) pipe(&(0x7f0000000040)) 02:22:57 executing program 4: 02:22:57 executing program 3: 02:22:57 executing program 1: [ 2462.688193] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 02:22:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x501040, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x1, 0x2) r4 = dup2(r0, r0) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r1, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000005}, 0x40) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:22:57 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x2b0, &(0x7f000000a000)) 02:22:57 executing program 1: 02:22:57 executing program 3: 02:22:57 executing program 4: 02:22:57 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x0, 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000001ac0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000001b00)={@remote, @loopback, @mcast1, 0x1, 0x100000001, 0x808, 0x400, 0x8, 0x40100000, r3}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:57 executing program 4: 02:22:57 executing program 1: 02:22:57 executing program 3: 02:22:57 executing program 4: 02:22:57 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x92ffffff00000000, &(0x7f000000a000)) 02:22:57 executing program 1: [ 2463.043579] rpcbind: RPC call returned error 22 02:22:58 executing program 4: 02:22:58 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x4000000000000000, &(0x7f000000a000)) 02:22:58 executing program 1: 02:22:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x18000, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x400200, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000140)={0x3, r2}) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:22:58 executing program 3: 02:22:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x90040, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = socket$inet(0x2, 0xffffffffffffbffd, 0xfffffffffffffffa) bind$inet(r1, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40, 0x0) recvfrom$inet6(r2, &(0x7f0000000100)=""/197, 0xc5, 0x0, &(0x7f0000000200)={0xa, 0x4e20, 0xb2, @mcast1, 0x3}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8000000000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) setsockopt$inet_int(r1, 0x0, 0x32, &(0x7f0000000040)=0x20, 0x4) 02:22:58 executing program 1: 02:22:58 executing program 3: [ 2463.459161] rpcbind: RPC call returned error 22 [ 2463.470332] rpcbind: RPC call returned error 22 02:22:58 executing program 4: 02:22:58 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfffffff6, &(0x7f000000a000)) 02:22:58 executing program 3: 02:22:58 executing program 1: 02:22:58 executing program 4: 02:22:58 executing program 3: 02:22:58 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xf, &(0x7f000000a000)) [ 2463.795190] rpcbind: RPC call returned error 22 [ 2463.805983] rpcbind: RPC call returned error 22 02:22:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0xd1, 0xfffffcd5) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c00460730d089e69e0000220000000000000000008000040000f8ff000c00", @ANYRES32=0x0], 0x1c}}, 0x0) 02:22:58 executing program 1: 02:22:58 executing program 4: 02:22:58 executing program 3: 02:22:58 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff39, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000034001406e90000003bfcffffffffffff710250f382b5fc16081f46e3f1d34070e3e8b47cf7bbb0fcb00fa9ffc6b049bb7d2ad662ddc3fb6cd89617ef6eccd16a512213d6a472a500e3f8b3c5db9d96484f08d012"], 0xfffffffffffffe34}, 0x1, 0x800000000000000}, 0x4) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x200, 0x0) mkdirat(r2, &(0x7f00000001c0)='./file0\x00', 0x22) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) prctl$PR_CAPBSET_READ(0x17, 0x25) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0x7, 0x734, 0x1, 0x3}, {0x1, 0x0, 0x16a123f1, 0x6f}]}, 0x8) r3 = add_key(&(0x7f0000001640)="71759d5cac2e428eafdc8d37e8f368707228d37ae8ccef8c6a4c46ecb1af4d04a596a11d5d611531ae49c63126bf8158242a6dc3182c692cc4616ce210f6edc1b677fb265d41818449c9100c9aa6e6994fe3dcecd4131d06ac1e7e6fdce2267a11f9956cc09b28c801474ad067cf43ae8cfb22002000000000463a055b37c90407775acfbddc3b0d4f347c7d403eb4f7e93639b2b533d2c3f9a784ffc30acf4a5871df9b4fde61579939a511447b98e3b00d20fa2f9713f90d89d40bd016a7ad5cff82510d0c011141984e4574cf9140c62b395dd82862816237e7f768fae947dcf91deaa6e83f9557be", &(0x7f0000001740)={'syz', 0x2}, &(0x7f0000001780)="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", 0x145, 0xfffffffffffffff8) keyctl$get_security(0x11, r3, &(0x7f0000000280)=""/4096, 0x1000) 02:22:58 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3f00000000000000, &(0x7f000000a000)) 02:22:58 executing program 1: [ 2464.065445] rpcbind: RPC call returned error 22 [ 2464.076356] rpcbind: RPC call returned error 22 02:22:58 executing program 3: 02:22:58 executing program 4: 02:22:58 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xde00, &(0x7f000000a000)) 02:22:58 executing program 3: 02:22:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:22:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000340)={0x4, 0x8, 0xfa00, {r3}}, 0x10) bind$packet(r1, &(0x7f0000000300)={0x11, 0x17, r2, 0x1, 0x20}, 0x14) write$P9_RCLUNK(r1, &(0x7f00000000c0)={0x7, 0x79, 0x1}, 0x7) accept4$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x80800) write$P9_RXATTRCREATE(r1, &(0x7f0000000100)={0x7, 0x21, 0x1}, 0x7) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000480)={{0xa95, 0x80000001}}, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000380)={'teql0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]}) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x1c}}, 0x0) 02:22:59 executing program 1: clone(0x1fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000003, 0x20400000087) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001200)={'nat\x00', 0x0, 0x2000, 0x3b5, [], 0x10000334, &(0x7f00000001c0), &(0x7f0000000200)=""/4096}, &(0x7f0000000080)=0x108) 02:22:59 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:59 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x7402, &(0x7f000000a000)) 02:22:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000), 0x14) 02:22:59 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x18c, &(0x7f000000a000)) [ 2464.391850] kernel msg: ebtables bug: please report to author: Nentries wrong [ 2464.429788] kernel msg: ebtables bug: please report to author: Nentries wrong 02:22:59 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r2 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') lstat(0x0, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000200)) 02:22:59 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x7, 0x200) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4c24, 0xfffc, @local, 0x4}, 0x1c) r1 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$security_smack_entry(r0, &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000200)='\x00', 0x1, 0x1) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) 02:22:59 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x207a, 0xd0000) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200000, 0x0) renameat(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000280)={0x17, 0x88, &(0x7f0000000180)="3fd2d9ccdf20f692672e472d60ad1a2e1a1f377e396309fda65ba7b536cabf0cddfabca825c4109a48e7dc7239a6464029864431be93ac9e8cb34880f0947cac229b70140baf1f29da698c29f4e7c111275bbdf0da383d3546791fae996c97e20b6107c237f0e10219f71487cc51f34b7b4bb87f97409b6d022a43832cabe144d54b2a5a49476b1e"}) 02:22:59 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000900)={0x0, 0x2, 0x0, 0x0, &(0x7f0000000880)=[{}, {}]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x331) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:22:59 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3e000000, &(0x7f000000a000)) [ 2464.635110] rpcbind: RPC call returned error 22 [ 2464.644393] rpcbind: RPC call returned error 22 [ 2464.741060] rpcbind: RPC call returned error 22 [ 2464.755102] rpcbind: RPC call returned error 22 02:22:59 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) r1 = request_key(&(0x7f0000000040)='logon\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='[\x00', 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000001780)='keyring\x00', &(0x7f00000017c0)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$instantiate_iov(0x14, r1, &(0x7f0000001700)=[{&(0x7f0000000140)="c3b0d10eb857a3f5079347fbce35aa3bf57e570846d8e798f8e493ae6a073c1bb3274218890d6d487bd5eed8c0afaa267a5a44aa7958a52afcd8e19220ce69b6bb34ae5e1367421273431eec19368bf0163bbc982d5992a96d11f9216fce346990208028c367ab21fc52cd1a1b0145a2739a0ef4299a42bdd7acd3fc4ae8ae153c1c193fce2da50e84b35f37bcd4448a1a002615523c1a590cd85ee6ca55dc132d510d6edaa984811a7d6b97b93edf810a2a6989597db35b5686f799277e4e4886cc338d", 0xc4}, {&(0x7f0000000280)="04e7d964c842add7e21b82007bb92a21c49defa0e67bb665488babc16e50653526ef4e147bd95861256b664eed8f5046012233a60e08a3fa360a0856b69b3700e4da777570773f343245c06a37c376dc72d892fcc8067fbb4bacb812190e81656b1ed653631a29303a90088e8bc456", 0x6f}, {&(0x7f0000000300)="8af00c48d6a6c11b87090ab9377cfa186877fc24c6c1168ad56ed5fd6041d728531a9fa975ef3cc7e78cea6741a8761d6f14ca1d3c6b5ac173701675a1ef5a69d53d33fcb56943d79786824c531a8946551f87690500d2debf0638df9da67e04cbd765421175ab00fe8a0ab0e3349021c3faa581f6e8ee84dfc8efee225f2cce72f82f816d07f28cfa9e0d4c72eb184094ab743fabe0b16c5968b502ed92b5a1f762d2a8763651d493fb0fb899d2442f3fa1c5a76e36e3e80130148f5e777f692018dda2c684", 0xc6}, {&(0x7f0000000400)="709565d5722ad95a48999e9f6286596aa81e60128b22f55bc98e73ba3bd42ce073e5b94b8c7ec9f2f30c9c7474e493ff9f42c1beba44bd94d97a50bf8a8503e55f453dd1da83e429764b2499441cbc9f6b616545b849ce46d690e4388a84c75be3272ca056486b704fe8d454b1e5bb1ff0d3c24edaa05ab01d7ed25a571f82048bfa24e2ea6a2f58aefee2a7dce39d1b42ffdaf1", 0x94}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="6d137bc33b1e68b68e16e4f4dd35e5a3fcd14b10a7c08f8e11d5c8bb5e", 0x1d}, {&(0x7f0000001500)="f7728d7db87eaa2e95cb8f8a8164e49d2ae6554050dd3528607ae8cc416278d6cada5fabc108c8583b1da7623b7d9baf8628874cea29d9d1af74e428579c7566d1ca468adbd15686d97efed92ffaffc761ae3ddbad40b215cb4a37206641eb6d06d7f42b8886ddaf533d73a02557b70018369c47eb298ebed5efdbe75d83b5c1a46dd5510dfe28347334f251027203205ef0ff24df148e7709a406d7b56f7cbc79682d95671d7cfe010d1c8ec2a1320d973b476c8cc0a873b57649ba78789fb99bedbf0d190a25f6ea0873cdd195b71e29bd94945975c145f7874d", 0xdb}, {&(0x7f0000001600)="925d8784e8f11b7991bffcc8634173adfacbd6a6fafa287768b0d890d293abd3d3", 0x21}, {&(0x7f0000001640)="4df14b171fd2ca7fb2f03035f44737a4bcbe562b3eb48d81f192d4e44f289fb2ca297a0a559c1a0ec42aa6f25a7f4a66aaa46b1d098ab1fd0d5f64b964b2b2e2f97f1371bce4d630bae7b4d819c44409141d575e87df7456342b96aba4866d3989f1476834ffdddc7e9063c05fb79256468efff81b1b785ea44a34aaeb4ca73c87896720065b078f3f01dfdd5c82b7fc63972eca306d63fb01ded097c8a51f9181147d4438cfd2486fb7fbff6f4665eb25", 0xb1}], 0x9, r2) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001880)={r0}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000002900)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x8}}, 0x74, 0x4}, &(0x7f00000029c0)=0x88) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000002a00)={r5, 0x4}, &(0x7f0000002a40)=0x8) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001800)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$SG_SET_DEBUG(r6, 0x227e, &(0x7f0000001840)) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000028c0)=0x869, 0xfffffffffffffe50) sysinfo(&(0x7f00000018c0)=""/4096) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="140000001c00fdffed0000000000000001000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:59 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x20000000, &(0x7f000000a000)) 02:22:59 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001c00fdff0000000000000000570000009a993a937023a54f221fe0afc0eb6e57ab8709b7cb8250a7d4dabe0d2a6a8957b0f08373515d2b84ac2874289dbd690647792418"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:22:59 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x10, &(0x7f000000a000)) [ 2464.896292] rpcbind: RPC call returned error 22 [ 2464.902288] FS-Cache: Duplicate cookie detected [ 2464.907245] FS-Cache: O-cookie c=000000009281df04 [p=00000000d521cfab fl=212 nc=0 na=0] [ 2464.915388] FS-Cache: O-cookie d= (null) n= (null) [ 2464.921912] FS-Cache: O-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2464.922003] FS-Cache: N-cookie c=00000000c0b48d9a [p=00000000d521cfab fl=2 nc=0 na=1] [ 2464.922013] FS-Cache: N-cookie d=00000000a5cfa8b5 n=00000000e65ebde8 02:22:59 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x40000, &(0x7f000000a000)) [ 2464.922020] FS-Cache: N-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2464.977662] rpcbind: RPC call returned error 22 02:22:59 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xde02, &(0x7f000000a000)) 02:22:59 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x10, &(0x7f000000a000)) 02:22:59 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x80fe, &(0x7f000000a000)) [ 2465.129853] rpcbind: RPC call returned error 22 02:23:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000002200f60000000008000000ed0300800008000c00b6e3e4c30e2fc44a96ffaedc17200311717e1fc0b7b628391790a1c3e2491117b6ac123024eaa31db856197d2c0f585a0000000000000000000000", @ANYRES32=0x0], 0x1c}}, 0x0) 02:23:00 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x10, &(0x7f000000a000)) 02:23:00 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x342, &(0x7f000000a000)) 02:23:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x0, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:23:00 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:00 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x50610030}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="f80000001e00010c2dbd7000fbdbdf251000000008002100", @ANYRES32=r1, @ANYBLOB="dc009200a5bce898c00e58c33283ba14fa939e1fa4e972157aff064d43ea5cf79016956a0b47272254f25bc7a26df28ee73dfff19017ce223a206ded513ff3baa4dd4e983b7f482e66866bdf13c5a61722d127c205218317eeb96a390fa62a684a70c578239b6e3b20a2a4fbfd95296abda08b7f185a0afc11bfc25fcc4ab31d72a9c3ba63a424167f81a95247253ead10465e733e53c7b26fa0774134422a967ce3e2a491afa17153d5f912ff12e5e43c3fc01f4d920137a08d08003100", @ANYRES32=r3, @ANYBLOB="10004e00242908004d00000000e0ff0000000000000000000000"], 0xf8}, 0x1, 0x0, 0x0, 0x4001}, 0x4004000) r4 = syz_open_procfs(r3, &(0x7f0000000440)='attr/current\x00') setsockopt$inet6_udp_encap(r4, 0x11, 0x64, &(0x7f0000000240)=0x7, 0xffffffffffffff28) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x10080, 0x0) sendfile(r0, r5, &(0x7f00000000c0)=0x5b, 0x0) recvfrom$inet6(r5, &(0x7f0000000380)=""/161, 0xa1, 0x40000023, &(0x7f0000000200)={0xa, 0x4e20, 0x89aa, @mcast2, 0x3ff}, 0x1c) 02:23:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2465.685339] kernel msg: ebtables bug: please report to author: bad policy [ 2465.692365] rpcbind: RPC call returned error 22 02:23:00 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3e, &(0x7f000000a000)) 02:23:00 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0xfd91) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xc73, 0x200000) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000100)={{0xb523, 0x9}}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:00 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x1200000000000000, &(0x7f000000a000)) 02:23:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfd, 0x200}, 0xc) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c00000022000100000000000000a5080400000008000c00", @ANYRES32=0x0], 0x1c}}, 0x0) 02:23:00 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10000, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000100)=0x630) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x6) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) [ 2465.975094] rpcbind: RPC call returned error 22 [ 2466.003695] rpcbind: RPC call returned error 22 02:23:00 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x81ffffff00000000, &(0x7f000000a000)) 02:23:00 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x7000000, &(0x7f000000a000)) [ 2466.189303] rpcbind: RPC call returned error 22 02:23:01 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x4c000000, &(0x7f000000a000)) [ 2466.248125] rpcbind: RPC call returned error 22 [ 2466.257121] rpcbind: RPC call returned error 22 02:23:01 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x3402, &(0x7f000000a000)) [ 2466.368473] rpcbind: RPC call returned error 22 [ 2466.376773] rpcbind: RPC call returned error 22 02:23:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000100)={0x0, @aes256, 0x2, "3924d41c2b1b0cfe"}) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0xfffffffffffffe76) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x402000, 0x0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x3) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c00000022000100000000000000005b4000000008000c00", @ANYRES32=0x0], 0x1c}}, 0x0) 02:23:03 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x2e, &(0x7f000000a000)) 02:23:03 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10000, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000100)=0x630) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x6) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:03 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:03 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:03 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0xfd91) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xc73, 0x200000) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000100)={{0xb523, 0x9}}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:03 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x7a, &(0x7f000000a000)) 02:23:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) getpgid(0x0) mq_notify(r1, &(0x7f0000000200)={0x0, 0x200002f, 0x1, @thr={&(0x7f0000000240)="920888994d6f95ae8dd9e2a359ba727e2fdbecaeead7fa8ef15c5199060da6446aec18349d81842f49f35de2eca614051b540ed02f8086e45d4b7b4abd982838b9ddfb", &(0x7f00000002c0)="f99242cab137683aebcff996ab31edefa0dd523c96d5a39305307ef9875b2bce480b0e7b04e22d88042f874e4a8b12beebb6b95437d368d7455c909f6e11a58db1eed52bd87983cf44ae74b430da3cbb448c2be56312084b5515fd4f5821723b2bd20c1b8d95f414cdf533205c8e5ea9c1e9a68150677fae74ccf6da7e5be4ebee13183464041d0503d4d0eff5d18a176c2951946581f854739286c9692d473f2df68c0ae364aa7eeb17214251763ed70533a02da46c33e223a112f86720b4e4f64d8c3c750b81ed122ec7835bc460c1bc4b91729cf0d21e04097edeb803cfede96b0c111d09502e46bdd4"}}) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x5, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) seccomp(0x0, 0x1, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x10000, 0x7fff, 0x7, 0x3}]}) 02:23:03 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x6001, &(0x7f000000a000)) 02:23:03 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfffffffe, &(0x7f000000a000)) 02:23:03 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xff03000000000000, &(0x7f000000a000)) [ 2469.271108] rpcbind: RPC call returned error 22 [ 2469.293342] rpcbind: RPC call returned error 22 02:23:04 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x7a00, &(0x7f000000a000)) 02:23:04 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xc003, &(0x7f000000a000)) 02:23:04 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfffff000, &(0x7f000000a000)) [ 2469.558090] rpcbind: RPC call returned error 22 [ 2469.567204] rpcbind: RPC call returned error 22 02:23:04 executing program 1: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x10000, 0x0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000100)=0x630) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x6) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:06 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:06 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x9c030000, &(0x7f000000a000)) 02:23:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002680)=ANY=[], 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000140)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) clone(0x4000000000007ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000340)=0x2, 0x4) sendmmsg(r0, &(0x7f0000007e00), 0x4000000000000f4, 0x900) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000cc0)=@filter={'filter\x00', 0xe, 0x4, 0x5d8, [0x0, 0x200006c0, 0x20000944, 0x20000bb0], 0x0, &(0x7f0000000200), &(0x7f0000001240)=ANY=[@ANYBLOB="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"]}, 0x6af) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000240)) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f00000006c0)={0x8, 0x52cf292f, [{0x4, 0x0, 0x3}, {0x5, 0x0, 0x4000}, {0x6, 0x0, 0x6}, {0x7ff, 0x0, 0x8}, {0x5, 0x0, 0x80}, {0x6}, {0x32, 0x0, 0x2}, {0x7, 0x0, 0x4}]}) clone(0x0, &(0x7f0000000280), 0x0, &(0x7f0000000380), &(0x7f00000003c0)="efb2dddb603fe9251bfe24869e136c96c55737d4263f5e98ea1c025b899aebe52c85fd094b5722d0ae1a715adde7c46ba31e5ef0b623ac82c7553c2b80d2b632524f6840e7cf87008890ac466d48566b5e95e6b9a575733b53b065d0ed83a24db977a96c8378b0adb60a26bcb1ac73c4b7105e50e2942eb5725dac4a2b07d6471fded1") ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x100, 0x1, 0x6, 0x2, 0x0, 0x90, 0x204, 0xd, 0x2, 0x0, 0x7, 0x2, 0x80000000, 0x80000001, 0xf0, 0x5, 0x5, 0x200, 0x9, 0x45, 0x1f, 0x400, 0x0, 0x73, 0x401, 0x5, 0x8, 0xc359, 0x4da, 0x9, 0x91, 0x47, 0x4, 0xf630, 0xfff, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x5, 0xff}, 0x10402, 0x401, 0x101, 0x0, 0x3, 0x0, 0x2}, r2, 0xffffffffffffffff, 0xffffffffffffff9c, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000840)=0x5195, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000640)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000007c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x8, @remote, 0x10000}, {0xa, 0x4e24, 0x4, @mcast1, 0x7000000000}, r3, 0xfffffffffffffffc}}, 0x48) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000680), 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000480)={0xffffffffffffffff}, 0x106, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x0, "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", 0x0, 0x0, 0x442, 0xd2c, 0x0, 0x0, 0x100000001, 0x1}, r4}}, 0x128) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000009c0)={r1, &(0x7f0000000880)="db39a430d62f78a0d93baaef9d93d03dafc03ec96dff597574ae54195c79bab4a095d6475b16181f0c3dcc720da6794705de279fc6afae7504ddfbe8af776de8a89306fa9c9a1be59bf6f58853f421d778b609ad28f58a485c0985c46e4b11ef4f8722a4644ac2924fd272fac5da6286cc6ebcc26e1679932e2e315d9eeeca1f10b13555893d8ef00175de33d0db51942eaa68ead84c135f052e6146ea96b1007939b3f2f7d4a86c0af4491f00c541e04acd20befd240b2e4c183d07201f33a5b6f9e5cb3430679d8bd78dd70bc368fc02a96b72c955d8ecc209e3368c07c9344e24", &(0x7f0000000980)=""/18}, 0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000100)={r5, 0x6, 0xe00000000000}, &(0x7f00000001c0)=0x8) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200400, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r7, 0x10e, 0x8, &(0x7f0000000140)=0x2, 0xffffff59) ioctl$DRM_IOCTL_GET_CAP(r7, 0xc010640c, &(0x7f00000000c0)={0x9, 0x23}) sendmsg$nl_generic(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[]}}, 0x0) 02:23:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x1) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c00400022000100c808000000000000000400000008000c", @ANYRES32=0x0], 0x1c}}, 0x0) 02:23:06 executing program 0: r0 = socket$inet(0x2, 0xfffffffffffffffc, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0xf, 0x3) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:06 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xf0, &(0x7f000000a000)) 02:23:06 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x9, 0x101000) setsockopt$inet6_dccp_int(r1, 0x21, 0x17, &(0x7f0000001a00)=0x84, 0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000040)) 02:23:06 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x803, &(0x7f000000a000)) 02:23:06 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x318, &(0x7f000000a000)) [ 2472.183011] rpcbind: RPC call returned error 22 [ 2472.197523] rpcbind: RPC call returned error 22 [ 2472.331838] rpcbind: RPC call returned error 22 [ 2472.349672] rpcbind: RPC call returned error 22 02:23:07 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfe00000000000000, &(0x7f000000a000)) [ 2472.495362] rpcbind: RPC call returned error 22 [ 2472.512933] rpcbind: RPC call returned error 22 02:23:07 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xff030000, &(0x7f000000a000)) 02:23:07 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xc0030000, &(0x7f000000a000)) 02:23:07 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 02:23:07 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 02:23:07 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f00000001c0)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x9, 0x9, 0x1, 0x4}) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:09 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x4203, &(0x7f000000a000)) 02:23:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:09 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)=0xffffffffffffff81) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x6, 0x1c5201) r2 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x572, 0x84000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x0, 0x361) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYRESOCT=r1, @ANYRES32=0x0], 0x2}}, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) 02:23:09 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 02:23:09 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="010000000000000000000800ffff00000100000058b9e4530ced0c53f6e1b4c08a58f142e021cd0bafe0b674e2017a931dd0e5eb472a05da1e8370c0344436eb627732e188653f68e91672e388b934a6cd3c4bdc107aa5f7412f6d018c19d63809786362c9e3cb572b70b53fb47961be"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:09 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x84, &(0x7f000000a000)) [ 2475.227566] rpcbind: RPC call returned error 22 02:23:10 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xb002000000000000, &(0x7f000000a000)) [ 2475.352669] rpcbind: RPC call returned error 22 02:23:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffd, 0x54b002) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x4800000000000000, 0x3, 0x10001, 0xc75, 0xffffffffffff2a10}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000002c0)={r2, 0x3, 0x9}, 0x8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) prctl$PR_GET_NAME(0x10, &(0x7f0000000300)=""/180) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=ANY=[@ANYBLOB="dd4596ae2200010100000000000000000400000008000c008cb5574e6244824709dcb3ff6cbca6a37e69ab128d519450b35da6db0fc35e0f2c16a2c432b259f1983bbf2cf3e60e86d63e7180495bdb7f88493e8715a0751aae3c22eba89f65cd1a4c5c04f4d38400950effca08eb81a864f49f719eecfe741691dcd54afe79024e8d88f4e41563e958339c170bb1d24132f016", @ANYRES32=0x0], 0x1c}}, 0x0) 02:23:10 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001c00fdff0000000000000000c48c9c7093bc609e5a33205e2a8dc9756224ce9e90ebc888675fb3d51be5acd6357f788ed259bcf1c71e679c3176899bb3f0d21d73513d9bd56047a8f1204bf067e077d30000000000000000000000000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1f, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000100)=0x7, 0x4) [ 2475.494059] rpcbind: RPC call returned error 22 [ 2475.526376] rpcbind: RPC call returned error 22 02:23:10 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0xfa030000, &(0x7f000000a000)) 02:23:10 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000003000), &(0x7f0000003000)=0x2b) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0x4008744b, &(0x7f0000003000)=""/174) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000220001000000000088719488095cb45108000c005f1cb4dc2d2ef31604dc734fd0681e22196298090096a4fd20f692a917448022dd8ef15b553703445d267f2c27ebc3538ba80ad28ee14945e5a23b7d29e920c50780eed49a11020d185679c281e28737bea4b3776fd45d854984226d5c7f12d816d956a833995d0238d747d52c3786cd9f31d16465083b60dd3caf7a8c1b9a5b757256cec2af2a2352925a40c2523d2ab4285a8180a3a87e966beb9173a6c437cbfea6eef95c244f50da234ebd02edb4bced432b7e121c5a580095fac643964eb9f3bf", @ANYRES32=0x0], 0xfffffffffffffee7}}, 0x0) 02:23:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:23:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:12 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:12 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) sendto$inet(r0, &(0x7f0000000000)="603d9c7492a445347de04c3e6e653aec304350539cb2dc26b9ce954ab28eb9ee57c4e4e6cae2db8fd82119982f8c82d65e34c8b603022b9692dd1d9ddec5b1377537a661a76629998d094e8d1087c7c4941332afa50df2571e9b39ba7525aecc22c5c1079fa9e4f3416f2a276d7ab7aa2c2ea3dbb833897071", 0x79, 0x800, 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:12 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000280)="e20106071532f25d8c04db70d7ec9f60f734054f006402828e37d8b762a16e625119e40e49e3498c1994751f99fd324b55e5b200fb3428020c5c8dba516c6beb8fb2b9654d0dfb5d09410fdb677f1501b0ecafd56436193054cedce678502506efe889ffe5da04e3b582f133b643a850b2ff3f7f8102c5e0fbf8c31b8aa8dbdcc2f053cc6f5036c602c653cc578b12e2d82ba64d9b875a986f54e94edf772164618cf342a9d62743a60617cded38e9e5b9a2f6e76bf6e59286f95cf7afdb37de3914393fc1449be1ddf9f7dd73c5301b07", 0xd1, 0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x80000, 0x0) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f00000003c0)={0x80, 0x0, 0x1}) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="15d51635e4a0ae22204ed4f23c2c48d571b05bbf68b37340f39f9a47680efdc0f3b31838023047bfd0501d42ef9a0cc67af65635252f4a05a48bd4179bd719a582cddabc4b1b445453791a9507bf76861c3f81f92fa51f14c1665519fa0b48cc5591df3a605251e880d3059a8f19768fdf24f5d758e57c4bc90b202226bfaac28d2f241a0776", 0x86, r2) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001c00fd00000000010000000000b710003b6608c713c7df62b28283f16e19d6e89be8d57e60675b260aeef618b63dca4113e167a92d6ccea25415cfe1001dcb764652caea7dc46323fbb40ca3bc59ef7c520d589e76c6cd6c1de1a408d2285427e87eb80d535b82d2c3162bb7bc1f657776e026eae2a17362d858b60c3afa257b4c750fde0000000000000000000000000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) alarm(0x8000) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200010000000000000000020400000008000c00", @ANYRES32=0x0], 0x1c}}, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000100)="2fca8e83d2", 0x5) openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x101000, 0x0) 02:23:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x8, 0xfffffd88) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000100)={0x5, 0x6, 0x2, "314d5a536d0c4adb90f440086c818aaa51e96ffd76a46d45fa40b1407b8725a4", 0x3447504d}) 02:23:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:12 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f0000000000)='system--\x00') [ 2478.006460] rpcbind: RPC call returned error 22 02:23:12 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, &(0x7f0000000000)=0x2f) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) prctl$PR_GET_TIMERSLACK(0x1e) [ 2478.241302] rpcbind: RPC call returned error 22 [ 2478.252793] rpcbind: RPC call returned error 22 02:23:13 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x10200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000500)={0xbf, 0x3, {0xffffffffffffffff, 0x0, 0x7, 0x3, 0x40}}) perf_event_open(&(0x7f000000a000)={0x2, 0xfffffffffffffe3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f00000002c0)={0x6, 0x0, 0x10001}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40086436, &(0x7f0000000300)={r1, 0x9}) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) quotactl(0x7, &(0x7f0000000380)='./file0\x00', r2, &(0x7f0000000480)="f51decf91348270d6e7ff4b9a486dfba36cdb06a06ed58bd16ac8495ff5e16c7172f270fd923f1e2e79ea77aed3030f9fce0383dda8be634a99594c4f92f458d12800968c03ec5b850eb4391e677abeeb4cdb3f16886b960d1") ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x2300) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) r3 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="73656c666c6f162d2c00", 0xfffffffffffffffe) r4 = add_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="5138fea3e447cd51296a922eb4132c7a265365ef10a5c7e3ac15781985b0d266e3df22d26d4f80d5584db282c92abc2ddbdb3798474840f58d6d0dd82cb8c13047ab6c7703a53164f1b4bf5156d4b81adcc5b7d728cc7a88301400a1fb47c559cce3a22bc4bde4d06e20d64d87206dc59a0178345cb84cbb15063dd7497c04e2221424cc2bef6336c9363b0ad0339bfcb5ac74aa5be7fd294fbe38d276b11937c40f17ea41156e5849960301b29210386591f0ebdd10b3488bbe2cc258d3e746b53aacd1f2a3b148d3a1238d849261e61e98187850a02e9ee1528518eb16", 0xde, 0xfffffffffffffff9) keyctl$link(0x8, r3, r4) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:13 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0xc00e000000000000) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:13 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2478.366753] rpcbind: RPC call returned error 22 [ 2478.377392] rpcbind: RPC call returned error 22 02:23:13 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() getpgrp(r1) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "78c6294b37620953dbf241e7872c52ece1c1ddbe"}, 0x15, 0x3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) getresuid(&(0x7f00000005c0)=0x0, &(0x7f0000000600), &(0x7f0000000640)) r8 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000680)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000780)=0xe8) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000a00)={{}, {0x1, 0x5}, [{0x2, 0x2, r2}, {0x2, 0x2, r3}, {0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x1, r6}, {0x2, 0x5, r7}, {0x2, 0x2, r8}, {0x2, 0x1, r9}], {0x4, 0x2}, [{0x8, 0x7, r10}, {0x8, 0x7, r11}, {0x8, 0x2, r12}, {0x8, 0x7, r13}], {0x10, 0x4}, {0x20, 0x1}}, 0x84, 0x1) [ 2478.460867] rpcbind: RPC call returned error 22 [ 2478.470357] rpcbind: RPC call returned error 22 [ 2478.510473] rpcbind: RPC call returned error 22 02:23:13 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:13 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000200)='\\nodev\x00'}, 0x30) pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000380)) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3ff, 0x200, 0xffff, 0x51, 0x0, 0xd7dc, 0x8, 0xf, 0x7, 0x100000000, 0x1, 0x80, 0xba, 0x1f, 0x4, 0x8, 0x6, 0x5, 0x400, 0x9, 0x7b9, 0xf6, 0x4, 0x74e, 0x1, 0x40, 0x3, 0x9, 0x7, 0x1ee, 0x910, 0x6, 0x1, 0x5, 0x40, 0x4, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x3}, 0x80, 0x6, 0x5, 0x6, 0x6, 0x2, 0x6}, 0xffffffffffffffff, 0x8, r0, 0x1) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x80108000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) recvfrom$unix(r2, &(0x7f0000000000)=""/64, 0x40, 0x40, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)="6e6673006e3448f5ad9a51346784bb54b6d29de2d738fc322eb828448d5111690b097a18f2bed406e35746a1f1c958e79136627b0b4c0ed50c8757f937f5d199e2e1dab03b72dfae82c427698ea55dabeac52a7f88f98c5ff86af2b2a1b210287806f26393b55ad32b8643b1a8d2ab8bec2d6ad6f9cbd4a07fdfdc58fae46e4a6dc317e1ef4362beaddd8d7a735a0a2d3289124f72461b081b31e79b", 0x4400, &(0x7f000000a000)) 02:23:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x200c0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)=0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200810000000000000000000400000008000c00", @ANYRES32=0x0], 0x1c}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x6, 0xd5e8, 0x7fffffff, 'queue0\x00', 0x9}) socketpair(0x8, 0x0, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) setns(r2, 0x22000000) 02:23:13 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001c00fdff000000000000000001000000d95f6428576b8e6c67007f95bc27dbf2bd189ccf722c947ce50159630e32fe70c3b74faa539ddb78ffff0001000000000043b8308b0cc44e6f7a892100000000000000f8c30123d28b78452876821e2fb29808b6713ab9ccb77ccc77320203a5db2c339ef8e8c87b7178c4c39e51c1dc2d33e63faab4710a1beec6121f5b6ed3fd5a4fcbb6a09625d5f6213ea3a70000000000000000"], 0x1}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x24000, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r1) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000140)={r4, 0x1f, 0xe94}, 0x8) 02:23:13 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000180)="0dbd6a09c18f39fed6b6c1e19a5a36a99895118bb762591a695bc6d34eb661655228353efc0b4a8a126a27f5018fb99537d453beef246f73d7b0351a61d2c7531068fafcf92915e9479839e88d599927dacd6538dfb3bceea9a048a73b1078cc3d4bbabe36a0874d0a27b29c12b3def6d204d3794aea2dbbd795359b8b8ae46d608ab6e7c7e11d2f4b0efbe5aa911fe750664bed20b4209d8a0667ff6d92a89cff46f863b6b7e9b8924abe3cfb1062510f7496e2a404bbe14fd41cb071de5a022c437428b36132925f5395dc90189bbdab9640daf16ec96780fa3f8816c5a2a9f0ba8f688c1e6fa53465ed5cfab9575d14bc8e", 0x0}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(r2, &(0x7f00000007c0)) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)) getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r5, @ANYBLOB="02fd0300", @ANYRES32=r6, @ANYBLOB="1000010000000000200002000000"], 0x7, 0x1) [ 2479.044053] rpcbind: RPC call returned error 22 [ 2479.112009] rpcbind: RPC call returned error 22 02:23:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:15 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000180)="0dbd6a09c18f39fed6b6c1e19a5a36a99895118bb762591a695bc6d34eb661655228353efc0b4a8a126a27f5018fb99537d453beef246f73d7b0351a61d2c7531068fafcf92915e9479839e88d599927dacd6538dfb3bceea9a048a73b1078cc3d4bbabe36a0874d0a27b29c12b3def6d204d3794aea2dbbd795359b8b8ae46d608ab6e7c7e11d2f4b0efbe5aa911fe750664bed20b4209d8a0667ff6d92a89cff46f863b6b7e9b8924abe3cfb1062510f7496e2a404bbe14fd41cb071de5a022c437428b36132925f5395dc90189bbdab9640daf16ec96780fa3f8816c5a2a9f0ba8f688c1e6fa53465ed5cfab9575d14bc8e", 0x0}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(r2, &(0x7f00000007c0)) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)) getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r5, @ANYBLOB="02fd0300", @ANYRES32=r6, @ANYBLOB="1000010000000000200002000000"], 0x7, 0x1) 02:23:15 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4004240b, &(0x7f0000000080)={0x0, 0x70, 0x990, 0x0, 0x6, 0x1, 0x0, 0x8, 0x10, 0x0, 0x81, 0x3, 0x4, 0x8, 0x6, 0x6, 0x7, 0x7, 0x7f, 0x4, 0x80000001, 0x714, 0x200, 0x79, 0x0, 0x0, 0x8, 0x7, 0x3485, 0x0, 0xfffffffffffffffc, 0x6, 0x6, 0x7ff, 0x8, 0x0, 0x80, 0x6, 0x0, 0x8, 0x1, @perf_config_ext={0x5, 0xffffffffffffff32}, 0x0, 0x401, 0x7, 0x7, 0x3, 0xf4da, 0x300000000000000}) 02:23:15 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x2000) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f00000000c0)) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000140)=""/66, 0x3ff, 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xb0, r1, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffffffffffffff9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x5}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x1}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000081}, 0x80) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200010000000000000000000401000008000c00", @ANYRES32=0x0], 0x1c}}, 0x0) r2 = dup(r0) ioctl$NBD_SET_SIZE(r2, 0xab02, 0x5147) 02:23:15 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2481.046843] rpcbind: RPC call returned error 22 02:23:15 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) write$P9_RVERSION(r0, &(0x7f0000000000)={0xffffff4d, 0x65, 0xffff, 0x6, 0xfffffffffffffe92, '9P2000'}, 0x13) [ 2481.078374] rpcbind: RPC call returned error 22 [ 2481.110503] rpcbind: RPC call returned error 22 02:23:15 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000180)="0dbd6a09c18f39fed6b6c1e19a5a36a99895118bb762591a695bc6d34eb661655228353efc0b4a8a126a27f5018fb99537d453beef246f73d7b0351a61d2c7531068fafcf92915e9479839e88d599927dacd6538dfb3bceea9a048a73b1078cc3d4bbabe36a0874d0a27b29c12b3def6d204d3794aea2dbbd795359b8b8ae46d608ab6e7c7e11d2f4b0efbe5aa911fe750664bed20b4209d8a0667ff6d92a89cff46f863b6b7e9b8924abe3cfb1062510f7496e2a404bbe14fd41cb071de5a022c437428b36132925f5395dc90189bbdab9640daf16ec96780fa3f8816c5a2a9f0ba8f688c1e6fa53465ed5cfab9575d14bc8e", 0x0}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(r2, &(0x7f00000007c0)) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)) getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r5, @ANYBLOB="02fd0300", @ANYRES32=r6, @ANYBLOB="1000010000000000200002000000"], 0x7, 0x1) 02:23:15 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2481.208255] rpcbind: RPC call returned error 22 [ 2481.217861] rpcbind: RPC call returned error 22 02:23:16 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x1e, &(0x7f0000000040)='-keyringwlan1:vmnet0vboxnet1#\x00', 0xffffffffffffffff}, 0x30) getpgrp(r1) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2481.321644] rpcbind: RPC call returned error 22 [ 2481.465404] rpcbind: RPC call returned error 22 02:23:16 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockname$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000180)={0xb, {0x3, 0x6, 0x1f, 0x8}}) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil}) 02:23:16 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x600000000217ffd, 0x80) write$P9_RREAD(r1, &(0x7f00000000c0)={0x3d, 0x75, 0x2, {0x15, "fdaf349a9f803882f0fb482cba496a3b88ec2b71baf25b487bedc9e29663c23680b493377923c4798e772ff81d6483698f1e"}}, 0x3d) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x135, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000100)) [ 2482.698322] device bridge_slave_1 left promiscuous mode [ 2482.703870] bridge0: port 2(bridge_slave_1) entered disabled state [ 2482.757942] device bridge_slave_0 left promiscuous mode [ 2482.763567] bridge0: port 1(bridge_slave_0) entered disabled state [ 2482.882027] team0 (unregistering): Port device team_slave_1 removed [ 2482.898506] team0 (unregistering): Port device team_slave_0 removed [ 2482.915080] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2482.984081] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2483.126450] bond0 (unregistering): Released all slaves 02:23:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) fstatfs(r0, &(0x7f0000000100)=""/93) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:23:19 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x1e, &(0x7f0000000040)='-keyringwlan1:vmnet0vboxnet1#\x00', 0xffffffffffffffff}, 0x30) getpgrp(r1) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:19 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000140)=0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001c00fdff000000000000000001000000e337773454e27fc2712a7f405dfd25d45c5ff07974c25a59c56043436417ba46efc89133ee25a811b444c01eda0e5973a3b11df7d719d2fe4830e52b67f26b66d1ce943785d541114b86cde2a837c7cf051c26fa42df931ef19058"], 0x14}, 0x1, 0x800000000000000}, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x400402, 0x0) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f00000002c0), &(0x7f0000000340)=0x60) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:19 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x48, 0xf5, &(0x7f0000000180)="005c39a41998a4bf2de1903b656d879100af1190bfe39e60e7736dadcd55f536c5d284356a03dd10257a68779f850f92e7c60d4641eae96ed674b90bd11af577f45be6a4240aee1a", &(0x7f0000000200)=""/245, 0x2}, 0x28) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64EXEC\x00', &(0x7f0000000040)=',%/-vmnet0)posix_acl_accessposix_acl_access$!trusted}selinuxmime_typesystemuserGPL(+\x00', 0x55, 0x2) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, 0x40011, r0, 0x0) 02:23:19 executing program 4: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:19 executing program 4: syz_open_dev$evdev(0x0, 0x0, 0x2) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:19 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2485.143241] IPVS: ftp: loaded support on port[0] = 21 [ 2485.199747] IPVS: ftp: loaded support on port[0] = 21 02:23:20 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:20 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000040)) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x78, r1, 0x102, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6e}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x401}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x101}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x408880, 0x0) getsockopt$inet_int(r2, 0x0, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) [ 2486.104626] device bridge_slave_1 left promiscuous mode [ 2486.114038] bridge0: port 2(bridge_slave_1) entered disabled state [ 2486.188252] device bridge_slave_0 left promiscuous mode [ 2486.194025] bridge0: port 1(bridge_slave_0) entered disabled state 02:23:21 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e000000100000000000000000004000000000000000000000000000000000000000"], 0x34) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2486.370115] team0 (unregistering): Port device team_slave_1 removed [ 2486.384342] team0 (unregistering): Port device team_slave_0 removed [ 2486.404158] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2486.464205] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2486.585349] bond0 (unregistering): Released all slaves [ 2487.954622] bridge0: port 1(bridge_slave_0) entered blocking state [ 2487.968868] bridge0: port 1(bridge_slave_0) entered disabled state [ 2487.984075] device bridge_slave_0 entered promiscuous mode [ 2487.998933] bridge0: port 1(bridge_slave_0) entered blocking state [ 2488.007075] bridge0: port 1(bridge_slave_0) entered disabled state [ 2488.014390] device bridge_slave_0 entered promiscuous mode [ 2488.105215] bridge0: port 2(bridge_slave_1) entered blocking state [ 2488.126694] bridge0: port 2(bridge_slave_1) entered disabled state [ 2488.134007] device bridge_slave_1 entered promiscuous mode [ 2488.159528] bridge0: port 2(bridge_slave_1) entered blocking state [ 2488.165981] bridge0: port 2(bridge_slave_1) entered disabled state [ 2488.178019] device bridge_slave_1 entered promiscuous mode [ 2488.236993] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2488.286701] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2488.334469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2488.394847] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2488.670653] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2488.711755] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2488.786386] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2488.823146] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2488.936329] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2488.966730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2488.980306] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2488.987618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2489.031142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2489.038110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2489.272430] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2489.286058] team0: Port device team_slave_0 added [ 2489.298388] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2489.307294] team0: Port device team_slave_0 added [ 2489.356879] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2489.377025] team0: Port device team_slave_1 added [ 2489.386441] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2489.394177] team0: Port device team_slave_1 added [ 2489.459759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2489.477474] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2489.529404] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2489.579348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2489.604231] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2489.626848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2489.638540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2489.680485] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2489.687727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2489.699635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2489.732342] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2489.746935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2489.763065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2489.787819] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2489.797039] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2489.818472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 02:23:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:24 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x800, 0xcf3e3e88ddd4c16f) [ 2490.585628] bridge0: port 2(bridge_slave_1) entered blocking state [ 2490.592068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2490.598767] bridge0: port 1(bridge_slave_0) entered blocking state [ 2490.605147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2490.647409] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2490.656442] bridge0: port 2(bridge_slave_1) entered blocking state [ 2490.662882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2490.669576] bridge0: port 1(bridge_slave_0) entered blocking state [ 2490.675954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2490.699014] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2490.886928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2490.908009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2493.798996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2494.010011] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2494.113624] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2494.251686] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2494.291006] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2494.297782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2494.308133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2494.439899] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2494.446103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2494.454837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2494.467764] 8021q: adding VLAN 0 to HW filter on device team0 [ 2494.610261] 8021q: adding VLAN 0 to HW filter on device team0 [ 2495.460818] rpcbind: RPC call returned error 22 02:23:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001b00)=[{0x10, 0x1}], 0x10}}], 0x1, 0x40800) 02:23:30 executing program 2: sysfs$3(0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) ioprio_get$pid(0x1, r1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:23:30 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:30 executing program 0: r0 = socket$inet(0x2, 0x0, 0x80000000) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x500, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x3) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="14eb2a05129bfdff000000001b00000401000000"], 0x14}, 0x1, 0x800000000000000}, 0x20008080) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:30 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:30 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2495.584628] rpcbind: RPC call returned error 22 02:23:30 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2495.635733] QAT: Invalid ioctl [ 2495.671884] QAT: Invalid ioctl 02:23:30 executing program 1: write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:30 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x4000) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x2000) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f00000000c0)='keyringvboxnet0wlan1self&-cgroup\x00') 02:23:30 executing program 3: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000280)=0x4000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) sendfile(r1, r2, &(0x7f0000000180), 0x100000001) 02:23:30 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:30 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:30 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x40800, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000000c0)={0x20, {{0xa, 0x4e24, 0x8001, @dev={0xfe, 0x80, [], 0x14}, 0x5}}, 0x1, 0x1, [{{0xa, 0x4e20, 0x3, @loopback, 0x81}}]}, 0x10c) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={0x1464, 0x42, 0x205, 0x0, 0x0, {0x1}, [@generic="1f91592698e54a07ff48f48197a9b9b76ba019f3b6d0a96c9fa08de2cdc748c5723313310df7825181ce69f4f77611e189c8c44a652dcd992eb95698095bdb0d1260330e4ee75c8380f1c8a6919a0d63d2792ad75390f43839c02fd389b27c0853031ca92820e475a7bfb11bb3efda1a3e97ee84b13c0f6430af19b68262", @typed={0x8, 0x39, @u32=0x200}, @typed={0x8, 0x44, @u32=0xfffffffffffffffb}, @nested={0x1208, 0x2, [@typed={0x8, 0x4, @u32=0xa28}, @typed={0x8, 0x14, @ipv4=@empty}, @generic="ae1a0691a581faea0eaa5b02386d75151bebabe8bf0a8c5dbeaca837916a6d0ed318f04b7d376dee457d94f90fbcd609a1fb40591433b16bee2d4cead3ad3e12b305fa24baac29021c85d1b46d443a6bdadca669e20da1682448c6b18f8573173ce7b5d5d4920cf4b49c5c7f4a4875247c93c465f9b89638f9149d0b23685be23bf586fbb2c8aa3bfc8b3b9b4ec76c89c6d7aaa66383f0a618ae25ff1989c364c5d3c74a7248c33c0da51776c1abc5001688e5b786c89d05d7", @generic="5f90558c9fa34a9c98018856db6aad2c8137fd61421aab636eed920d25d84b698ca403c17088506ac22d44e8182476ced24709a606becce83a754cb00dc342cf5b20", @generic="619644f6e4ad805671ad44dc8f6d814b471ac888f0fb7ed1716a7b5a57e06e4b6a856c1ac8744ed5061b38f342f77ed3c178aa2c077aadccdd925070911db1c5efdd19b579a21616a0b40fc2b0350c1683823f45cf8136180d973487a8e828cbbb27768b3a51b7c6df56de2dc91b10b6a7aad6a8a0f45210795735d6917745e6954afaf1914a64946a7388efdc5600991c4c1b6a6df5687c7d0a5a2da7ed056f11dfa9ee5705874fd165919f327d7a346f4067eb002b9004566a89a9d5dcd3f7", @typed={0x10, 0x1, @str='/dev/mixer\x00'}, @generic="dabbba6d3c7956ee9992b1b778bf8cb5454c499f9d2c55379424a7323c1de3b77c5651", @typed={0x1004, 0x53, @binary="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"}]}, @nested={0x1b8, 0x8e, [@generic="e472195d44bb35ec8aaf8a9bef343425dfd99c2a3f7a663f35d6432adf59317b6d8d023325fdfdcd7447b5f5be95b42de20ed15844c66c4f69999032790fada2f2aece866239c1f576528a079eb55a394a232ef1e9f6ba0d1d3a4f2ace34808f4c977b8c18cb27c02a0b6453cef0d8d482b3242e749f59541787e9f6768a8e18fadfa0cb462689bd5f88a7b3ef262b2af28d14b300cb96c1574708340423b87cbde747fc9ccadbbb9962ba6eeb89582402fecda1a600b51323", @typed={0xe4, 0xd, @binary="4ad191c991269e47769be32bace9f19263f0c4b75fa9b381d29469410dcda14a436fb114424b943c1adb19f3b9569f43e85839364ea58a99f5c7b99daae005e4e350f82335fc80b57930e7ab8634fd47a3863a66af750a7b24197682d20c2b8e5d6eefc5f143c8fd07b23d2780325075cb530a1df86f948c1cff73f6c26a25acfdfc02747d45ddd40b744e3ad9f0365e955951bce50aff8b41d8866b092938ef8b3ecf57a9db897b1125746fcb23c5a95c103305e2cc3e4a2d11f544c94ac7f9a34ed55614ab5ce56134978398adfd9a72ea5b6144be312eff295dc0f8d27aeb"}, @typed={0x14, 0x94, @ipv6=@loopback}]}]}, 0xfffffffffffffd67}, 0x1, 0x800000000000000}, 0x8000) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:30 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r1, r2, &(0x7f0000000180), 0x100000001) 02:23:30 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$setregset(0x4205, r1, 0x207, &(0x7f0000000080)={&(0x7f0000000380)="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", 0x1000}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:30 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbf7, 0x20004}, 0x150) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:23:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:30 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x20800, 0x0) write$P9_RMKDIR(r4, &(0x7f0000000300)={0x14, 0x49, 0x2, {0x2, 0x0, 0x1}}, 0x14) setreuid(r1, r3) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES16=r3, @ANYPTR64, @ANYBLOB="c62326d81c203d69bb24c0ad3b8e5f71e13976477c83fdabab51d7974939cdb584970b1b006bd4f6066185ec1af62060571fc7160b914391f4621ab1d50b463cc6f2c260dba6ee502b935043d16ae6658954be025db3c28e0ddf5792bbed37b3e48b3c5f6715c145e0630a30b3eb18b72461a4c135d3cdfba153b74a07a9df7c6fae230373aa4e4275e1dea7dd8518b787a142708407e226a9bbfbf0490a6b1f66920afa0169534e0b59a8c9fcdc085c3e41c51e52c4a82558d8a15e826ef075e75a", @ANYRESOCT=r4, @ANYRESHEX, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES64=r4, @ANYRESHEX=r2, @ANYRESHEX=0x0, @ANYPTR, @ANYRES64=r4, @ANYRESHEX=r2, @ANYPTR, @ANYRES64=r2, @ANYRES32=0x0, @ANYRES64=0x0], @ANYRESHEX=r2, @ANYRESDEC=r3, @ANYRESDEC=r2]], 0x1}, 0x1, 0x800000000000000, 0x0, 0xfffffffffffffffc}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:30 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x60802, 0x0) accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x80801) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) connect$can_bcm(r0, &(0x7f00000001c0)={0x1d, r1}, 0x10) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0xfffffffffffffbfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) setsockopt$inet_dccp_int(r2, 0x21, 0x1f, &(0x7f0000000000)=0x3, 0x4) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2496.220718] rpcbind: RPC call returned error 22 [ 2496.234659] rpcbind: RPC call returned error 22 02:23:31 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x80000001) 02:23:31 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2496.406138] rpcbind: RPC call returned error 22 02:23:31 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x100, 0x0) r2 = getpgrp(0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x240, 0x1a, 0x0, 0x70bd2b, 0x25dfdbfb, {0x8}, [@nested={0xbc, 0x7d, [@typed={0x14, 0x34, @ipv6=@remote}, @generic="7696d62e58fb031d3c818f3c89597ff4c4a73f3eac29339f7de92202bb9dd09d1eef529e89c1bb179574dd5db64a676115ae922ed683dfc1a732a3f1a9edfa9f6eea47c46fc25397fdbc1d659a7e237c8c7b31c95317b880547bab5e2aeceb8b041fb3cf3438d6c3cc6938e66bbb7ab4f600f5045edd9047ec4318309c4e838b41434025dd5275857a95ecff7444fbad34f576d543d0e9df1b52e154adfbbdc998"]}, @typed={0x8, 0x95, @pid=r2}, @nested={0xf4, 0x17, [@generic="67677496dda66ad81c07ae8f4d263ace172e9f4e10b89e9c273a8c9dcc926941384818b738c1e68506ffb6ca07334148616b8cae25f1719d001eff6a7087a739934fb3da2f5cc2c3977384ac7b688690c2af7710ffb08c04c5e35fa86859a997e9b0e967ec793b88a481b75f697e3f9a7c4970c7e9e8c28e709b2d7ff85e221e5d6777347f49cda34018c7fab9fd3a308b93d104f89a7a08905def7e7e41406c74a71fcc759bbefe1d09a93aadbbddaf7a99e476468b22708aa858a6984e807cc095590b26b84af5486b4de7da656f1b7e2d95fa8a2d8632f1f529b9f0731e933d2215d41e", @typed={0x8, 0x47, @u32}]}, @generic="f1166df3add26b0c6f8496b499cd5ff42aae943afe580abf3f16f45f145a4d0461192b0613a108735f0ab0b3f5f63c4dec7c87f47bd7f77ba9ec11ed925e717083f3e69bdf5c2518a8400035aa258ff8feb8e0e1ab78565fe6062fad83295d294ba7d94959d4693ab5e81fb64ec0807e6ced"]}, 0x240}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000580)={{0x1, @addr=0x3}, "b24570810f0d553adf9ebd7de3753665b8e07201e561fdc537600d786de6f290", 0x3}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000140)={0x4, 0x5}, 0x2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001c00fdff000000000000000001000000c2aa17b442e7750000000000000800dca62269ff5dfe9d974512ed2c08d8c035311be75e799ece5d7b062babf54b8c7bce69eb830007463906fe85b55ce2b5e1926f2887e1a9970b9d7b0e3f90c75f0e8a687459694c801e2fad128f536e979a1fb854de28366b493d1c121bbf3ec4"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:31 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2496.428598] rpcbind: RPC call returned error 22 02:23:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000140)="0a5c2d024031ae85717070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ff07008fbda33d88c000001018dd"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000013c0), 0x0, 0x0, 0x0) 02:23:31 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) creat(&(0x7f0000000000)='./file0\x00', 0x100) [ 2496.620816] rpcbind: RPC call returned error 22 [ 2496.628517] rpcbind: RPC call returned error 22 02:23:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x60000) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:23:31 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:31 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cubic\x00', 0x6) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:31 executing program 3: gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000140)) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r1, r2, &(0x7f0000000180), 0x100000001) 02:23:31 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x1) clone(0xb7ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000500)="5d3d360651abadb286d3949d17d6c455a1f72da54c6ff5c19cf6463b6d84671028cdc134b2c308fe75ae3f8742e0f8bc4e4906240c143faac00414af26a2168278ca98454d8a3dad03089bb6f31aeae16ec275450b771618cbae44acf404c04dd6e86332c0f4a03e334896590c026de481a7adb8c6a655c9566eb09ae32812903280130c9aa110b11ab99f68fbf7867ed66ae0f37711f0d413d200") perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2497.076069] rpcbind: RPC call returned error 22 02:23:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 2497.217831] rpcbind: RPC call returned error 22 02:23:32 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x200000) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0x934, &(0x7f0000000100)=0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) getsockopt$packet_buf(r1, 0x107, 0x17, &(0x7f0000000180)=""/14, &(0x7f00000001c0)=0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000140)=0x9, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:32 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:32 executing program 3: 02:23:32 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000280)=""/80, 0x50}, {&(0x7f0000000300)=""/227, 0xe3}, {&(0x7f0000000400)=""/244, 0xf4}, {&(0x7f0000000500)=""/32, 0x20}], 0x4, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='ubifs\x00', 0x0, &(0x7f000000a000)) getdents64(r0, &(0x7f0000000180)=""/208, 0xd0) [ 2497.342554] UBIFS error (pid: 15188): cannot open "(null)", error -22 [ 2497.357287] UBIFS error (pid: 15196): cannot open "(null)", error -22 02:23:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000220001000000000000000000040000000800030003", @ANYRES32=0x0], 0x1c}}, 0x0) 02:23:32 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000040)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) ioctl(r0, 0x3, &(0x7f0000000000)="c9a842da8d21543324") prctl$PR_GET_FPEXC(0xb, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:32 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:32 executing program 3: 02:23:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:32 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) setpriority(0x2, r1, 0x20) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1b) getpgrp(0xffffffffffffffff) getpgrp(r1) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:32 executing program 3: [ 2497.628671] rpcbind: RPC call returned error 22 02:23:33 executing program 0: r0 = socket$inet(0x2, 0xb, 0x80) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x80000, 0x0) connect$l2tp(r1, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x0, 0x3, 0x0, {0xa, 0x4e23, 0xc0, @remote, 0x80000000}}}, 0x3a) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="00000001000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:33 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) chdir(&(0x7f0000000000)='./file0\x00') clone(0x7ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='nfs\x00', 0x0, &(0x7f0000000080)="90070000507fe088fcbf2d15693f12e3d3ce8432dd1b405b8e6789f4a6f6ddd292e4f922b62585b0a55257b37ad55fbbf0741308b8d5b1cd169918474d0d6e208b") 02:23:33 executing program 3: 02:23:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x100, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e20, @local}}, 0x5, 0x8, 0x40, "bf9567178390a553be3115871608b0156ad2304937b001c4ca52f02e4151e9c9d01752b74b67fbea442d55e6d831f827996c2c359f0f4bed2ef12a1241736b60806f1dc33b61f3df529e9c310d058912"}, 0xd8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 02:23:33 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/163) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:33 executing program 3: 02:23:33 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="5000000090780000"], 0x0) [ 2498.470843] rpcbind: RPC call returned error 22 02:23:35 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00000010000000"], 0x1a) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:35 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x5, &(0x7f0000000040)={0x0, 0x32, 0x7, @thr={&(0x7f0000000280)="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", &(0x7f00000000c0)="323692d608c8ee7b61b1ce07c32c4e4e2500286f294042bcf04ec8911ede4eabbfa536af85a9cb5ad8ac289926d5e40815ee97e08ea0e088dcf0d09aa68f526f63d981b4ac53377e5f289257edd99a3b007f323ec6a516a708f7736d2fa850da04e1abbd7c528bb045ce9a7a55f4b9b2a08afd21c6a04a25a5cb42859f19dfd198069fb19b5db0285c012631d61f0e69c03e01e25f1120704811ace4"}}, &(0x7f0000000180)=0x0) timer_settime(r1, 0x1, &(0x7f00000001c0)={{0x0, 0x989680}}, &(0x7f0000000200)) r2 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000001280)) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="140000000c010000000000000000000001001000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:35 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)="6e667300b71f1e59f26ab3c9b06d6912f6a8751c2fc88bfdc580e903101e3a42b3a25bcc599104f672defefbab4c5b44af1944cf9e098759d8a335c9479b1b3679b774682d3c53add4f453251d96be39ef682fef656f4865ea45", 0x0, &(0x7f0000000080)) 02:23:35 executing program 3: 02:23:35 executing program 2: 02:23:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) 02:23:35 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xd130, 0x101) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x619ba592cd8e19e2) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:35 executing program 2: 02:23:35 executing program 3: [ 2500.465508] rpcbind: RPC call returned error 22 02:23:35 executing program 2: 02:23:35 executing program 3: 02:23:35 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x3, @dev, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000001c0)={0x10000000001, 0x0, [0x10]}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x200, 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknodat(r2, &(0x7f0000000000)='./file0\x00', 0xc000, 0x5) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x40070, r2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) getpgrp(r3) r4 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.metacopy\x00', &(0x7f00000001c0)='nfs\x00', 0x4, 0x1) fcntl$getown(r4, 0x9) vmsplice(r4, &(0x7f0000000280)=[{&(0x7f0000000200)="5a449c542002d78c19e804c3a2ad3c8c2845903e523ed54136bdafd0fbca6540fee850b04d6e8efbd26eb866e1c726de39bd48d7fe52c12e8b69acef15e97e68aafa56303dd8cadea88fe3", 0x4b}], 0x1, 0xd) gettid() ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)=0x0) getpgrp(r5) truncate(&(0x7f0000000040)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2500.770836] rpcbind: RPC call returned error 22 [ 2500.894286] rpcbind: RPC call returned error 22 02:23:37 executing program 3: 02:23:37 executing program 2: 02:23:37 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x4e24, @local}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x400, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000180)={@empty, @rand_addr, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000200)=0xe8) getpeername(r0, &(0x7f0000000380)=@hci={0x1f, 0x0}, &(0x7f0000000400)=0x80) sendmsg$nl_xfrm(r1, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x30000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000440)=@polexpire={0x1b4, 0x1b, 0x219, 0x70bd28, 0x25dfdbfd, {{{@in6=@mcast1, @in=@local, 0x4e24, 0x4, 0x4e23, 0x4559, 0xa, 0x20, 0x20, 0xff, r2, r3}, {0x6, 0xfffffffffffffff8, 0x100000001, 0x4, 0x1f7, 0x5952d926, 0x0, 0x6}, {0x10000, 0x521be5de, 0x538, 0xdb4b}, 0x20, 0x0, 0x2, 0x1, 0x1}, 0x1}, [@offload={0xc, 0x1c, {r4, 0x2}}, @ipv6_hthresh={0x8, 0x4, {0x2d, 0x7a}}, @algo_auth_trunc={0xe0, 0x14, {{'sha1-avx2\x00'}, 0x498, 0x40, "b0ee087f11495d365e497708c4310d4b279b012a784b8efe71d010741bef23df3d75dbc8a7da7731dc37fc80aea3f26ebc8038099c35e6ed0b62e040b35a5b701f2a3fc3175cd6d7d9bd10fc5ff66bf41150a75747b701b475fcf78cb8daf4140a62e453f447c2ae8c684fdeced597f1c80b9438f22c4175423589234538c49b077aee7a6055a749fad75402aa521836f0e811"}}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x10}, 0x40000) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="141c00fdff004440c017a5e53a44f752aa330033870000000001000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:37 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:37 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2502.761403] rpcbind: RPC call returned error 22 [ 2502.800680] rpcbind: RPC call returned error 22 02:23:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 02:23:37 executing program 3: 02:23:37 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:37 executing program 2: 02:23:37 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x81) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r1, 0x0, 0x10, &(0x7f0000000080)='securityvmnet1/\x00'}, 0x30) fcntl$getown(r0, 0x9) fcntl$getown(r1, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r1, 0x0, 0xd, &(0x7f0000000180)='ð1keyring\x00'}, 0x30) fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) getpgrp(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40042406, &(0x7f0000000000)='posix_acl_access:\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000040)={0x1, 0x5, 0x102, 0x2, {0x7, 0x0, 0xffff, 0xdd27}}) 02:23:37 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000100)={0x1, 0x1, [@broadcast]}) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x12040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:37 executing program 2: 02:23:37 executing program 3: 02:23:37 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000003c0)=[@mss={0x2, 0xd4d}, @sack_perm, @mss, @timestamp], 0x4) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @rand_addr, @dev}, &(0x7f0000000040)=0xc) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, &(0x7f0000000080)="1af763e94dafcb37660a3262bb798c7bd4494f22154f5b7bb4fd1da8038d8157c94d") getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@dev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000340)="fe4a2d6c9063228c21b34252a590f0a9b054c2a67f923aa544fad09f1d3173861b77d43ab1412dd361660b9ad2f2354b504f0b32792c4424355ab2d1d74791b96f00a327d1bb32ebaf726f36038251f8e653a0027e1ffb5c2bf71f7eb36d2e0abe7613579d27bb48aea15c58a83b", 0x6e) bind$xdp(r0, &(0x7f00000002c0)={0x2c, 0x2, r1, 0x34, r0}, 0x10) openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) [ 2503.045756] rpcbind: RPC call returned error 22 02:23:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) 02:23:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x802, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xec2, 0x2040) r3 = getuid() fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r2, &(0x7f0000000080)='./file0\x00', r3, r4, 0x800) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r1, 0x0, 0x1000, 0x2, 0x3ff}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x10103d, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") sendfile(r1, r2, &(0x7f0000000180), 0x100000001) [ 2503.199441] cgroup: cgroup2: unknown option "÷céM¯Ë7f [ 2503.199441] 2b»yŒ{ÔIO"O[{´ý¨WÉM" [ 2503.353423] rpcbind: RPC call returned error 22 02:23:40 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x3) 02:23:40 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:40 executing program 2: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) 02:23:40 executing program 0: r0 = socket$inet(0x2, 0x80004, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:40 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d20000000000"], 0xd) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x800000001) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mmap(&(0x7f0000321000/0x4000)=nil, 0x4000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/155) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:23:40 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d20000000000"], 0xd) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2505.448648] rpcbind: RPC call returned error 22 02:23:40 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x5, &(0x7f0000000040)={0x0, 0x32, 0x7, @thr={&(0x7f0000000280)="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", &(0x7f00000000c0)="323692d608c8ee7b61b1ce07c32c4e4e2500286f294042bcf04ec8911ede4eabbfa536af85a9cb5ad8ac289926d5e40815ee97e08ea0e088dcf0d09aa68f526f63d981b4ac53377e5f289257edd99a3b007f323ec6a516a708f7736d2fa850da04e1abbd7c528bb045ce9a7a55f4b9b2a08afd21c6a04a25a5cb42859f19dfd198069fb19b5db0285c012631d61f0e69c03e01e25f1120704811ace4"}}, &(0x7f0000000180)=0x0) timer_settime(r1, 0x1, &(0x7f00000001c0)={{0x0, 0x989680}}, &(0x7f0000000200)) r2 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000001280)) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="140000000c010000000000000000000001001000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:40 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x100, 0x0) r2 = getpgrp(0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x240, 0x1a, 0x0, 0x70bd2b, 0x25dfdbfb, {0x8}, [@nested={0xbc, 0x7d, [@typed={0x14, 0x34, @ipv6=@remote}, @generic="7696d62e58fb031d3c818f3c89597ff4c4a73f3eac29339f7de92202bb9dd09d1eef529e89c1bb179574dd5db64a676115ae922ed683dfc1a732a3f1a9edfa9f6eea47c46fc25397fdbc1d659a7e237c8c7b31c95317b880547bab5e2aeceb8b041fb3cf3438d6c3cc6938e66bbb7ab4f600f5045edd9047ec4318309c4e838b41434025dd5275857a95ecff7444fbad34f576d543d0e9df1b52e154adfbbdc998"]}, @typed={0x8, 0x95, @pid=r2}, @nested={0xf4, 0x17, [@generic="67677496dda66ad81c07ae8f4d263ace172e9f4e10b89e9c273a8c9dcc926941384818b738c1e68506ffb6ca07334148616b8cae25f1719d001eff6a7087a739934fb3da2f5cc2c3977384ac7b688690c2af7710ffb08c04c5e35fa86859a997e9b0e967ec793b88a481b75f697e3f9a7c4970c7e9e8c28e709b2d7ff85e221e5d6777347f49cda34018c7fab9fd3a308b93d104f89a7a08905def7e7e41406c74a71fcc759bbefe1d09a93aadbbddaf7a99e476468b22708aa858a6984e807cc095590b26b84af5486b4de7da656f1b7e2d95fa8a2d8632f1f529b9f0731e933d2215d41e", @typed={0x8, 0x47, @u32}]}, @generic="f1166df3add26b0c6f8496b499cd5ff42aae943afe580abf3f16f45f145a4d0461192b0613a108735f0ab0b3f5f63c4dec7c87f47bd7f77ba9ec11ed925e717083f3e69bdf5c2518a8400035aa258ff8feb8e0e1ab78565fe6062fad83295d294ba7d94959d4693ab5e81fb64ec0807e6ced"]}, 0x240}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000580)={{0x1, @addr=0x3}, "b24570810f0d553adf9ebd7de3753665b8e07201e561fdc537600d786de6f290", 0x3}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000140)={0x4, 0x5}, 0x2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001c00fdff000000000000000001000000c2aa17b442e7750000000000000800dca62269ff5dfe9d974512ed2c08d8c035311be75e799ece5d7b062babf54b8c7bce69eb830007463906fe85b55ce2b5e1926f2887e1a9970b9d7b0e3f90c75f0e8a687459694c801e2fad128f536e979a1fb854de28366b493d1c121bbf3ec4"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:40 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d20000000000"], 0xd) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:40 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$VT_WAITACTIVE(r0, 0x5607) 02:23:40 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000040)={0x8, 0x1000, 0x81, 0xfffffffffffffff8, 0x79, 0x6}) mq_timedreceive(r0, &(0x7f0000000080)=""/120, 0x78, 0x9, &(0x7f0000000180)) [ 2505.715533] rpcbind: RPC call returned error 22 02:23:40 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:40 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x100, 0x0) r2 = getpgrp(0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x240, 0x1a, 0x0, 0x70bd2b, 0x25dfdbfb, {0x8}, [@nested={0xbc, 0x7d, [@typed={0x14, 0x34, @ipv6=@remote}, @generic="7696d62e58fb031d3c818f3c89597ff4c4a73f3eac29339f7de92202bb9dd09d1eef529e89c1bb179574dd5db64a676115ae922ed683dfc1a732a3f1a9edfa9f6eea47c46fc25397fdbc1d659a7e237c8c7b31c95317b880547bab5e2aeceb8b041fb3cf3438d6c3cc6938e66bbb7ab4f600f5045edd9047ec4318309c4e838b41434025dd5275857a95ecff7444fbad34f576d543d0e9df1b52e154adfbbdc998"]}, @typed={0x8, 0x95, @pid=r2}, @nested={0xf4, 0x17, [@generic="67677496dda66ad81c07ae8f4d263ace172e9f4e10b89e9c273a8c9dcc926941384818b738c1e68506ffb6ca07334148616b8cae25f1719d001eff6a7087a739934fb3da2f5cc2c3977384ac7b688690c2af7710ffb08c04c5e35fa86859a997e9b0e967ec793b88a481b75f697e3f9a7c4970c7e9e8c28e709b2d7ff85e221e5d6777347f49cda34018c7fab9fd3a308b93d104f89a7a08905def7e7e41406c74a71fcc759bbefe1d09a93aadbbddaf7a99e476468b22708aa858a6984e807cc095590b26b84af5486b4de7da656f1b7e2d95fa8a2d8632f1f529b9f0731e933d2215d41e", @typed={0x8, 0x47, @u32}]}, @generic="f1166df3add26b0c6f8496b499cd5ff42aae943afe580abf3f16f45f145a4d0461192b0613a108735f0ab0b3f5f63c4dec7c87f47bd7f77ba9ec11ed925e717083f3e69bdf5c2518a8400035aa258ff8feb8e0e1ab78565fe6062fad83295d294ba7d94959d4693ab5e81fb64ec0807e6ced"]}, 0x240}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000580)={{0x1, @addr=0x3}, "b24570810f0d553adf9ebd7de3753665b8e07201e561fdc537600d786de6f290", 0x3}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x100, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000140)={0x4, 0x5}, 0x2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001c00fdff000000000000000001000000c2aa17b442e7750000000000000800dca62269ff5dfe9d974512ed2c08d8c035311be75e799ece5d7b062babf54b8c7bce69eb830007463906fe85b55ce2b5e1926f2887e1a9970b9d7b0e3f90c75f0e8a687459694c801e2fad128f536e979a1fb854de28366b493d1c121bbf3ec4"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) [ 2505.794949] rpcbind: RPC call returned error 22 02:23:40 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x77359400}, {0x77359400}}) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2506.053130] rpcbind: RPC call returned error 22 [ 2506.070928] rpcbind: RPC call returned error 22 02:23:41 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000140)={r2, 0x80000, r0}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001c00f56effffffffffffff01ffffffff0f0000b9b179020000170000c05fb95c201b0082da2d245b6451525d81fa57a395c7c4411e304fe549a3c6f0ba4e8d79b354ac34cbf79022118f682039ced0842b4c847fc0b2d936391d8b6a0ea2b7890dc113186109d334f54dcfb80bea5c2159e9df7cc347677113f215979e070c9d3a7d000a6b0e731967dd356fc5869487eab03496d5a41688b2aad2dd14cda66722b95619f039ba4bd8e052eb2cbed2178092f13969491c1504b7e4f8dec6418ef2fa12dc6aaf254a7e135229306ed4d56331970d37da24d21ff37f69c4f222"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x7, 0x259bb43afd2a8a8d) 02:23:41 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000"], 0xe) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:41 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:41 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000001600)=0x83, 0x4) r1 = getpgrp(0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000240)=[{&(0x7f0000000000)=""/39, 0x27}, {&(0x7f0000000040)=""/63, 0x3f}, {&(0x7f0000000080)=""/98, 0x62}, {&(0x7f0000000180)=""/85, 0x55}, {&(0x7f0000000200)=""/40, 0x28}], 0x5, &(0x7f0000001540)=[{&(0x7f0000000280)=""/32, 0x20}, {&(0x7f00000002c0)=""/9, 0x9}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/177, 0xb1}, {&(0x7f0000000300)=""/48, 0x30}, {&(0x7f0000001440)=""/229, 0xe5}], 0x6, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) sysfs$2(0x2, 0xb8c, &(0x7f0000001580)=""/111) 02:23:41 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x60802, 0x0) accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x80801) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) connect$can_bcm(r0, &(0x7f00000001c0)={0x1d, r1}, 0x10) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0xfffffffffffffbfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) setsockopt$inet_dccp_int(r2, 0x21, 0x1f, &(0x7f0000000000)=0x3, 0x4) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:41 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x48, 0xf5, &(0x7f0000000180)="005c39a41998a4bf2de1903b656d879100af1190bfe39e60e7736dadcd55f536c5d284356a03dd10257a68779f850f92e7c60d4641eae96ed674b90bd11af577f45be6a4240aee1a", &(0x7f0000000200)=""/245, 0x2}, 0x28) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64EXEC\x00', &(0x7f0000000040)=',%/-vmnet0)posix_acl_accessposix_acl_access$!trusted}selinuxmime_typesystemuserGPL(+\x00', 0x55, 0x2) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, 0x40011, r0, 0x0) 02:23:41 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000"], 0xe) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:41 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x4e20, 0x7f, @loopback, 0x5}, {0xa, 0x4e24, 0xff, @local, 0x5}, 0xfffffffffffeffff, [0x5, 0x0, 0x9, 0xfffffffffffffeff, 0xffffffff, 0xffffffffffffff7f, 0x3]}, 0x5c) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)=ANY=[@ANYBLOB="140000040000fdff00fe00000000000001000000"], 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) [ 2507.121035] rpcbind: RPC call returned error 22 [ 2507.143491] rpcbind: RPC call returned error 22 [ 2507.146808] FS-Cache: Duplicate cookie detected [ 2507.152952] FS-Cache: O-cookie c=00000000cb870d2b [p=00000000d521cfab fl=222 nc=0 na=1] [ 2507.161185] FS-Cache: O-cookie d= (null) n= (null) [ 2507.167752] FS-Cache: O-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2507.175290] FS-Cache: N-cookie c=00000000efd06df3 [p=00000000d521cfab fl=2 nc=0 na=1] [ 2507.183336] FS-Cache: N-cookie d=00000000a5cfa8b5 n=000000009dbdbc11 [ 2507.189890] FS-Cache: N-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2507.197793] FS-Cache: Duplicate cookie detected [ 2507.202536] FS-Cache: O-cookie c=00000000cb870d2b [p=00000000d521cfab fl=212 nc=0 na=0] [ 2507.210906] FS-Cache: O-cookie d= (null) n= (null) [ 2507.217459] FS-Cache: O-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2507.224983] FS-Cache: N-cookie c=0000000059ed70d6 [p=00000000d521cfab fl=2 nc=0 na=1] [ 2507.232992] FS-Cache: N-cookie d=00000000a5cfa8b5 n=00000000ca2a40f6 02:23:41 executing program 1: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:42 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102000ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:42 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000"], 0xe) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2507.235863] rpcbind: RPC call returned error 22 [ 2507.239872] FS-Cache: N-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2507.243977] rpcbind: RPC call returned error 22 02:23:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x717010000000000) [ 2507.319154] rpcbind: RPC call returned error 22 02:23:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0xffffff7f00000002, 0xc00e000000000000}, 0xc, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x9, 0x20100) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x1a, "544f59ff0e63a7874d3e3766d8e438d86952849b999260cb06c2"}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) ioctl$TIOCEXCL(r2, 0x540c) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) process_vm_readv(0x0, &(0x7f0000001400)=[{&(0x7f0000000e40)=""/63, 0x3f}, {&(0x7f0000000e80)=""/10, 0xa}, {&(0x7f0000000ec0)=""/198, 0xc6}, {&(0x7f0000000fc0)=""/216, 0xd8}, {&(0x7f00000010c0)=""/204, 0xcc}, {&(0x7f00000011c0)=""/85, 0x55}, {&(0x7f0000001240)=""/108, 0x6c}, {&(0x7f00000012c0)=""/7, 0x7}, {&(0x7f0000001300)=""/197, 0xc5}], 0x9, &(0x7f00000017c0)=[{&(0x7f0000001480)=""/38, 0x26}, {&(0x7f00000014c0)=""/48, 0x30}, {&(0x7f0000001500)}, {&(0x7f0000001540)=""/178, 0xb2}, {&(0x7f0000001600)=""/235, 0xeb}, {&(0x7f0000001700)=""/165, 0xa5}], 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x8a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}, {{{0x11, 0x2, 0x19, 'bridge_slave_0\x00', 'bcsh0\x00', 'yam0\x00', 'vcan0\x00', @empty, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @dev={[], 0xc}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x110, 0x1bc, 0x1e4, [@mark_m={'mark_m\x00', 0xc, {{0x1, 0x1000, 0x3, 0x2}}}, @ip6={'ip6\x00', 0x4c, {{@loopback, @remote, [0xff, 0xffffffff, 0x0, 0xffffffff], [0xffffffff, 0x0, 0xff000000, 0xffffffff], 0x0, 0x3b, 0x2d, 0x2, 0x4e24, 0x4e21, 0x4e22, 0x4e20}}}]}, [@common=@nflog={'nflog\x00', 0x4c, {{0x7, 0x2, 0xb2, 0x0, 0x0, "a1829bf278c759a237513b399d38c174f37d1f93db265c26c1fb8718418bc12a64500ac51396381ed4ce86cc643d2d39c59d40fcc1ffa2ce3a816a730ccf740b"}}}, @common=@RATEEST={'RATEEST\x00', 0x18, {{'syz1\x00', 0x4, 0x80000000, 0x80000001}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x20}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x2, [{{{0x17, 0x14, 0x60f7, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @remote, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0x70, 0xb4, 0x124}, [@common=@ERROR={'ERROR\x00', 0x20, {"30bdf15ff849e4951aaa485122c493d50d33c27c2e09b0ce182bd1fe8b6d"}}]}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}, {{{0x9, 0x2, 0x88a8, 'bridge0\x00', 'team_slave_1\x00', 'nr0\x00', 'ip_vti0\x00', @remote, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x10}, [0x0, 0x0, 0xff, 0xff, 0xff], 0xa0, 0xd0, 0x118, [@realm={'realm\x00', 0xc, {{0xe542, 0x3}}}]}, [@common=@dnat={'dnat\x00', 0xc, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x24, {{0x3f, 'syz1\x00', 0x2}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x2, [{{{0x5, 0x6, 0x16, 'vcan0\x00', 'ipddp0\x00', '\x00', 'lo\x00', @broadcast, [0xff, 0xff, 0xff, 0xff], @remote, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x108, 0x144, 0x170, [@rateest={'rateest\x00', 0x3c, {{'veth1_to_team\x00', 'gre0\x00', 0x4, 0x0, 0x6, 0x7, 0x7fffffff, 0x2, 0x1ff, 0x7}}}, @owner={'owner\x00', 0x14, {{0x0, r3}}}]}, [@common=@RATEEST={'RATEEST\x00', 0x18, {{'syz1\x00', 0x3, 0xf020, 0x5}}}]}, @common=@mark={'mark\x00', 0x8, {{0xffffffc0, 0xffffffffffffffff}}}}, {{{0x9, 0x4, 0x8884, '\x00', 'bridge0\x00', 'gre0\x00', 'ip6gretap0\x00', @remote, [0xff, 0xff, 0x0, 0xff, 0xff], @link_local, [0xff, 0xff, 0xff, 0x0, 0xff], 0x70, 0x70, 0xb8}}, @common=@log={'log\x00', 0x24, {{0x9, "81de2a9aac48030f877bfb8c10f9cde94c22754177316a7c790d2f1f5e2f", 0x2}}}}]}, {0x0, '\x00', 0x6}]}, 0x8f8) [ 2507.368381] rpcbind: RPC call returned error 22 02:23:42 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003"], 0x11) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:42 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000000c0)=""/148) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:42 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000080)) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2507.392975] rpcbind: RPC call returned error 22 [ 2507.410673] rpcbind: RPC call returned error 22 02:23:42 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:42 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={&(0x7f0000000180)="0dbd6a09c18f39fed6b6c1e19a5a36a99895118bb762591a695bc6d34eb661655228353efc0b4a8a126a27f5018fb99537d453beef246f73d7b0351a61d2c7531068fafcf92915e9479839e88d599927dacd6538dfb3bceea9a048a73b1078cc3d4bbabe36a0874d0a27b29c12b3def6d204d3794aea2dbbd795359b8b8ae46d608ab6e7c7e11d2f4b0efbe5aa911fe750664bed20b4209d8a0667ff6d92a89cff46f863b6b7e9b8924abe3cfb1062510f7496e2a404bbe14fd41cb071de5a022c437428b36132925f5395dc90189bbdab9640daf16ec96780fa3f8816c5a2a9f0ba8f688c1e6fa53465ed5cfab9575d14bc8e", 0x0}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) r7 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)) getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r5, @ANYBLOB="02fd0300", @ANYRES32=r6, @ANYBLOB="02000000", @ANYRES32=r7, @ANYBLOB="02000400", @ANYRES32=r8, @ANYBLOB="040001000000000008000100", @ANYRES32=r9, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB='\b\x00\x00\x00', @ANYBLOB="10000100000000002000020000000000"], 0x12, 0x1) 02:23:42 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getpriority(0x0, r1) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$md(0xffffffffffffff9c, &(0x7f0000000180)='/dev/md0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='eth0\x00') ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f00000001c0)={[{0x2, 0x401, 0x6f, 0x8, 0x3, 0x4, 0x8, 0x4, 0x7ff, 0x35ef, 0xff, 0x9, 0x10001}, {0xffffffff00000001, 0x7aa, 0x7, 0x3, 0x8, 0xaa, 0x6, 0xfcb, 0x100000000, 0x5, 0x7, 0xc25, 0xffffffffffff9c8b}, {0x1, 0x5, 0xffffe00000000000, 0x3, 0x80000001, 0x0, 0x10001, 0x8, 0x8, 0x2, 0xff, 0x8001, 0x3}], 0x7}) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x5, 0x5, 0x2, 0x1, 0x1, 0x3, 0x6, 0x80000001, 0x4, 0x9, 0xc54, 0xb1f, 0x40}, {0x8000, 0x7, 0x5, 0x100, 0x5, 0x1f, 0x8, 0x3, 0x5, 0x8, 0x6, 0x7, 0x9fe5}, {0x3, 0x40, 0x2, 0x5, 0x9, 0x100000000, 0x2, 0x10001, 0x0, 0x7, 0x80000000, 0x8, 0x401}], 0x1}) [ 2507.542574] rpcbind: RPC call returned error 22 02:23:42 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x2, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x317010000000000) [ 2507.631877] rpcbind: RPC call returned error 22 02:23:42 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000180)=""/252, &(0x7f0000000280)=0xfc) fcntl$getown(r1, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) getpgrp(r2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2507.706150] rpcbind: RPC call returned error 22 02:23:42 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2507.754076] rpcbind: RPC call returned error 22 [ 2507.767514] rpcbind: RPC call returned error 22 02:23:42 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'ip6gre0\x00', {0x2, 0x4e21, @multicast1}}) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) r8 = getgid() setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x0, r2}, {0x2, 0x4, r3}], {0x4, 0x2}, [{0x8, 0x0, r4}, {0x8, 0x4, r5}, {0x8, 0x2, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}], {0x10, 0x2}, {0x20, 0x5}}, 0x64, 0x2) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x2080, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) [ 2507.874896] rpcbind: RPC call returned error 22 [ 2507.905024] rpcbind: RPC call returned error 22 [ 2507.973029] rpcbind: RPC call returned error 22 02:23:43 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x46000, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fc, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0xffffffffffffff47) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'nr0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x19}, 0x7f, r4}) ioctl$VIDIOC_G_FBUF(r3, 0x802c560a, &(0x7f0000000340)={0x42, 0x1, &(0x7f0000000440)="eb12f525521a0ab75c7b03020e8cbaad56ab78b3b524cf9c74084482df0a93ccd52cc52bd27a8287962b8660da197647919e58dd5e2616347c1e3d082705ac55eefb273da50d6cc0b3c744b964857861f6a96c36dd23f2bb78", {0xff4c, 0xe2, 0x35315241, 0x7, 0x7, 0x1, 0xb, 0x3f}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0xffffff7f00000002, 0xc00e000000000000}, 0xc, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0x200, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="1a000000544f19ff0e23a7874d3e3766d8e438d86952849b999260cb06c2"], 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100), 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={r6, 0x401, 0x1ff}, &(0x7f0000000200)=0x8) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000280)={0x8, 0x5, 0x2000}, 0x4) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@sack_perm, @mss, @window={0x3, 0x0, 0x5}], 0x3) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000003c0)={{0xbf, @empty, 0x4e22, 0x2, 'nq\x00', 0x4, 0x6, 0x4}, {@broadcast, 0x4e21, 0x2, 0x6, 0x3, 0x10000}}, 0x44) 02:23:43 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e"], 0x13) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:43 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400002100003f5689ecc13c8d5b9399e529eb4f555983a0632a7777194e81d602fdefb368fb62830d9d281eaf157b4c915600f7ff0000"], 0x1}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:43 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2002, 0x0) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000040)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) quotactl(0xfbb9, &(0x7f0000000180)='./file0\x00', r2, &(0x7f0000000240)="f7ecd7") r3 = mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)={r3}) 02:23:43 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'ip6gre0\x00', {0x2, 0x4e21, @multicast1}}) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) r8 = getgid() setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x0, r2}, {0x2, 0x4, r3}], {0x4, 0x2}, [{0x8, 0x0, r4}, {0x8, 0x4, r5}, {0x8, 0x2, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}], {0x10, 0x2}, {0x20, 0x5}}, 0x64, 0x2) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x2080, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 02:23:43 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={0x0, &(0x7f0000000380)="4c1f3807b6f2063f9076f8b18cdb99ab54e20b3706ff1fef27dbf7bce45b052a162b311f86627a3bf577892dce23a44ec5196f202ff0ee43b7c8085fefa0d396f17fc7fa2aeb1ad27c50f04b82863c14afa333e293715ffce91e01c69d665c40f44dd7ab5fd67e63cf3ba397713bdb130e062eb9f241c11b7736f52c557e9185effcd5441d3734809b9dc7a77fadf818161ccb30468d7dcc4d4975f23c68303a3f67494ca78aa6b4a5097765dc931106bdc8a287b86f06970282c00ee2f1eb4eef80a656eea07ff7fae4cde140cd5474a480ca17def009308d4936eaf1702ce90e6a6ee874b5f322f93c87fb14c2f37daf6c3aafdbc9"}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) r7 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0, 0x0, 0x0}, &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r5, @ANYBLOB="02fd0300", @ANYRES32=r6, @ANYBLOB="02000000", @ANYRES32=r7, @ANYBLOB="02000400", @ANYRES32=r8, @ANYBLOB="040001000000000008000100", @ANYRES32=r9, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r12, @ANYBLOB="ac730500", @ANYRES32=r13, @ANYBLOB="0800ac43", @ANYRES32=r14, @ANYBLOB="10000100000000002000020000000000"], 0x7c, 0x1) [ 2508.429402] FS-Cache: Duplicate cookie detected [ 2508.434175] FS-Cache: O-cookie c=00000000a2c344d7 [p=00000000d521cfab fl=212 nc=0 na=0] [ 2508.442384] FS-Cache: O-cookie d= (null) n= (null) [ 2508.448931] FS-Cache: O-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2508.456461] FS-Cache: N-cookie c=0000000051177db7 [p=00000000d521cfab fl=2 nc=0 na=1] [ 2508.464512] FS-Cache: N-cookie d=00000000a5cfa8b5 n=00000000f65fd9d5 [ 2508.471057] FS-Cache: N-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2508.478898] rpcbind: RPC call returned error 22 [ 2508.486930] FS-Cache: Duplicate cookie detected [ 2508.487286] IPVS: set_ctl: invalid protocol: 191 0.0.0.0:20002 [ 2508.491645] FS-Cache: O-cookie c=00000000a2c344d7 [p=00000000d521cfab fl=212 nc=0 na=0] [ 2508.491656] FS-Cache: O-cookie d= (null) n= (null) [ 2508.491663] FS-Cache: O-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2508.519933] FS-Cache: N-cookie c=000000000e37b6d9 [p=00000000d521cfab fl=2 nc=0 na=1] 02:23:43 executing program 1 (fault-call:3 fault-nth:0): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:43 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2508.527965] FS-Cache: N-cookie d=00000000a5cfa8b5 n=000000005af619f4 [ 2508.534502] FS-Cache: N-key=[22] '02000a00000000000000ff0700000000000000000000' 02:23:43 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x0, 0x32a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x666, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x7, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0xa00000400, 0x200, 0x7ff, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000001c0)={'tunl0\x00', {0x2, 0x4e22, @local}}) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000000)=""/127) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) getgroups(0x1, &(0x7f0000000180)=[r1]) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2508.658010] rpcbind: RPC call returned error 22 [ 2508.670143] rpcbind: RPC call returned error 22 [ 2508.685401] FAULT_INJECTION: forcing a failure. [ 2508.685401] name failslab, interval 1, probability 0, space 0, times 0 [ 2508.698630] rpcbind: RPC call returned error 22 [ 2508.787029] CPU: 1 PID: 15652 Comm: syz-executor1 Not tainted 4.20.0-rc5+ #266 [ 2508.794462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2508.803836] Call Trace: [ 2508.806456] dump_stack+0x244/0x39d [ 2508.810105] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2508.815334] should_fail.cold.4+0xa/0x17 [ 2508.819419] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2508.824538] ? __f_unlock_pos+0x19/0x20 [ 2508.828529] ? lock_downgrade+0x900/0x900 [ 2508.832697] ? proc_fail_nth_write+0x9e/0x210 [ 2508.837204] ? proc_cwd_link+0x1d0/0x1d0 [ 2508.841289] ? find_held_lock+0x36/0x1c0 [ 2508.845393] ? perf_trace_sched_process_exec+0x860/0x860 [ 2508.850858] ? check_preemption_disabled+0x48/0x280 [ 2508.855894] __should_failslab+0x124/0x180 [ 2508.860149] should_failslab+0x9/0x14 [ 2508.863958] kmem_cache_alloc+0x2be/0x730 [ 2508.868126] ? do_fast_syscall_32+0x150/0xfb2 [ 2508.872640] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2508.877246] getname_flags+0xd0/0x590 [ 2508.881063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2508.886630] __ia32_compat_sys_execveat+0xd4/0x140 [ 2508.891578] do_fast_syscall_32+0x34d/0xfb2 [ 2508.895928] ? do_int80_syscall_32+0x890/0x890 [ 2508.900525] ? entry_SYSENTER_compat+0x68/0x7f [ 2508.905129] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2508.910156] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2508.915012] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2508.919871] ? trace_hardirqs_on_caller+0x310/0x310 [ 2508.924903] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2508.929932] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2508.934970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2508.939924] entry_SYSENTER_compat+0x70/0x7f [ 2508.944343] RIP: 0023:0xf7fc9a29 [ 2508.947728] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2508.966641] RSP: 002b:00000000f5fa40cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2508.974358] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 0000000020000000 02:23:43 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0xe0cca3741bff7cc0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x250000, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond_slave_1\x00', 0x1801}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000000c0)={'\x00', 0x9}) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:43 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={0x0, &(0x7f0000000380)="4c1f3807b6f2063f9076f8b18cdb99ab54e20b3706ff1fef27dbf7bce45b052a162b311f86627a3bf577892dce23a44ec5196f202ff0ee43b7c8085fefa0d396f17fc7fa2aeb1ad27c50f04b82863c14afa333e293715ffce91e01c69d665c40f44dd7ab5fd67e63cf3ba397713bdb130e062eb9f241c11b7736f52c557e9185effcd5441d3734809b9dc7a77fadf818161ccb30468d7dcc4d4975f23c68303a3f67494ca78aa6b4a5097765dc931106bdc8a287b86f06970282c00ee2f1eb4eef80a656eea07ff7fae4cde140cd5474a480ca17def009308d4936eaf1702ce90e6a6ee874b5f322f93c87fb14c2f37daf6c3aafdbc9"}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) r7 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0, 0x0, 0x0}, &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r5, @ANYBLOB="02fd0300", @ANYRES32=r6, @ANYBLOB="02000000", @ANYRES32=r7, @ANYBLOB="02000400", @ANYRES32=r8, @ANYBLOB="040001000000000008000100", @ANYRES32=r9, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r12, @ANYBLOB="ac730500", @ANYRES32=r13, @ANYBLOB="0800ac43", @ANYRES32=r14, @ANYBLOB="10000100000000002000020000000000"], 0x7c, 0x1) [ 2508.981637] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2508.988915] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2508.996190] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2509.003472] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:23:43 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x46000, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fc, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0xffffffffffffff47) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'nr0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x19}, 0x7f, r4}) ioctl$VIDIOC_G_FBUF(r3, 0x802c560a, &(0x7f0000000340)={0x42, 0x1, &(0x7f0000000440)="eb12f525521a0ab75c7b03020e8cbaad56ab78b3b524cf9c74084482df0a93ccd52cc52bd27a8287962b8660da197647919e58dd5e2616347c1e3d082705ac55eefb273da50d6cc0b3c744b964857861f6a96c36dd23f2bb78", {0xff4c, 0xe2, 0x35315241, 0x7, 0x7, 0x1, 0xb, 0x3f}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0xffffff7f00000002, 0xc00e000000000000}, 0xc, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0x200, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="1a000000544f19ff0e23a7874d3e3766d8e438d86952849b999260cb06c2"], 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100), 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={r6, 0x401, 0x1ff}, &(0x7f0000000200)=0x8) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000280)={0x8, 0x5, 0x2000}, 0x4) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@sack_perm, @mss, @window={0x3, 0x0, 0x5}], 0x3) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000003c0)={{0xbf, @empty, 0x4e22, 0x2, 'nq\x00', 0x4, 0x6, 0x4}, {@broadcast, 0x4e21, 0x2, 0x6, 0x3, 0x10000}}, 0x44) 02:23:43 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_notify(r0, &(0x7f0000000040)={0x0, 0x1c, 0x4, @thr={0x0, &(0x7f0000000380)="4c1f3807b6f2063f9076f8b18cdb99ab54e20b3706ff1fef27dbf7bce45b052a162b311f86627a3bf577892dce23a44ec5196f202ff0ee43b7c8085fefa0d396f17fc7fa2aeb1ad27c50f04b82863c14afa333e293715ffce91e01c69d665c40f44dd7ab5fd67e63cf3ba397713bdb130e062eb9f241c11b7736f52c557e9185effcd5441d3734809b9dc7a77fadf818161ccb30468d7dcc4d4975f23c68303a3f67494ca78aa6b4a5097765dc931106bdc8a287b86f06970282c00ee2f1eb4eef80a656eea07ff7fae4cde140cd5474a480ca17def009308d4936eaf1702ce90e6a6ee874b5f322f93c87fb14c2f37daf6c3aafdbc9"}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)) getpgrp(0x0) gettid() getpid() fcntl$getown(r0, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a80)=0x0) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) r7 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000840)=[0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xee01]) lstat(&(0x7f0000000880)='./file1\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0, 0x0, 0x0}, &(0x7f0000000980)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r5, @ANYBLOB="02fd0300", @ANYRES32=r6, @ANYBLOB="02000000", @ANYRES32=r7, @ANYBLOB="02000400", @ANYRES32=r8, @ANYBLOB="040001000000000008000100", @ANYRES32=r9, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r12, @ANYBLOB="ac730500", @ANYRES32=r13, @ANYBLOB="0800ac43", @ANYRES32=r14, @ANYBLOB="10000100000000002000020000000000"], 0x7c, 0x1) [ 2509.069841] rpcbind: RPC call returned error 22 02:23:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="f9"], 0x1) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000340)=0x1, 0x4) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000003c0)=""/75, 0x4b}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2509.159232] rpcbind: RPC call returned error 22 02:23:43 executing program 2 (fault-call:6 fault-nth:0): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2509.235435] IPVS: set_ctl: invalid protocol: 191 0.0.0.0:20002 [ 2509.260955] rpcbind: RPC call returned error 22 02:23:44 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) setsockopt$sock_int(r0, 0x1, 0x39f15aea792cdefe, &(0x7f0000000000)=0x8, 0x4) prctl$PR_GET_THP_DISABLE(0x2a) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2509.330966] FAULT_INJECTION: forcing a failure. [ 2509.330966] name failslab, interval 1, probability 0, space 0, times 0 [ 2509.376651] CPU: 1 PID: 15687 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #266 [ 2509.384079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2509.393451] Call Trace: [ 2509.396065] dump_stack+0x244/0x39d [ 2509.399712] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2509.405487] should_fail.cold.4+0xa/0x17 [ 2509.409584] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2509.414705] ? __f_unlock_pos+0x19/0x20 [ 2509.418699] ? lock_downgrade+0x900/0x900 [ 2509.422865] ? proc_fail_nth_write+0x9e/0x210 [ 2509.427377] ? proc_cwd_link+0x1d0/0x1d0 [ 2509.431461] ? find_held_lock+0x36/0x1c0 [ 2509.435569] ? perf_trace_sched_process_exec+0x860/0x860 [ 2509.441033] ? check_preemption_disabled+0x48/0x280 [ 2509.446078] __should_failslab+0x124/0x180 [ 2509.450329] should_failslab+0x9/0x14 [ 2509.454143] kmem_cache_alloc+0x2be/0x730 [ 2509.458303] ? do_fast_syscall_32+0x150/0xfb2 [ 2509.462810] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2509.467419] getname_flags+0xd0/0x590 [ 2509.471233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2509.476788] __ia32_compat_sys_execveat+0xd4/0x140 [ 2509.481733] do_fast_syscall_32+0x34d/0xfb2 [ 2509.486157] ? do_int80_syscall_32+0x890/0x890 [ 2509.490756] ? entry_SYSENTER_compat+0x68/0x7f [ 2509.495349] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2509.500379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2509.505236] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2509.510092] ? trace_hardirqs_on_caller+0x310/0x310 [ 2509.515127] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2509.520159] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2509.525196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2509.530068] entry_SYSENTER_compat+0x70/0x7f [ 2509.534499] RIP: 0023:0xf7f79a29 [ 2509.537891] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2509.556800] RSP: 002b:00000000f5f540cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2509.564543] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 [ 2509.571827] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2509.579105] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2509.586385] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2509.593666] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2509.637617] rpcbind: RPC call returned error 22 [ 2509.655385] IPVS: ftp: loaded support on port[0] = 21 02:23:44 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2042, 0x0) write$selinux_attr(r2, &(0x7f00000000c0)='system_u:object_r:semanage_exec_t:s0\x00', 0x25) [ 2509.799020] rpcbind: RPC call returned error 22 [ 2509.820473] IPVS: ftp: loaded support on port[0] = 21 02:23:44 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x46000, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fc, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0xffffffffffffff47) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'nr0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x19}, 0x7f, r4}) ioctl$VIDIOC_G_FBUF(r3, 0x802c560a, &(0x7f0000000340)={0x42, 0x1, &(0x7f0000000440)="eb12f525521a0ab75c7b03020e8cbaad56ab78b3b524cf9c74084482df0a93ccd52cc52bd27a8287962b8660da197647919e58dd5e2616347c1e3d082705ac55eefb273da50d6cc0b3c744b964857861f6a96c36dd23f2bb78", {0xff4c, 0xe2, 0x35315241, 0x7, 0x7, 0x1, 0xb, 0x3f}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0xffffff7f00000002, 0xc00e000000000000}, 0xc, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0x200, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="1a000000544f19ff0e23a7874d3e3766d8e438d86952849b999260cb06c2"], 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100), 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={r6, 0x401, 0x1ff}, &(0x7f0000000200)=0x8) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000280)={0x8, 0x5, 0x2000}, 0x4) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@sack_perm, @mss, @window={0x3, 0x0, 0x5}], 0x3) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f00000003c0)={{0xbf, @empty, 0x4e22, 0x2, 'nq\x00', 0x4, 0x6, 0x4}, {@broadcast, 0x4e21, 0x2, 0x6, 0x3, 0x10000}}, 0x44) [ 2510.108195] IPVS: set_ctl: invalid protocol: 191 0.0.0.0:20002 02:23:47 executing program 1 (fault-call:3 fault-nth:1): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:47 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:47 executing program 2 (fault-call:6 fault-nth:1): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:47 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getcwd(&(0x7f0000000100)=""/101, 0x65) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x1, 0x2) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f00000001c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = getpgid(0xffffffffffffffff) sched_rr_get_interval(r3, &(0x7f00000000c0)) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:47 executing program 3 (fault-call:6 fault-nth:0): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:23:47 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2512.758668] FAULT_INJECTION: forcing a failure. [ 2512.758668] name failslab, interval 1, probability 0, space 0, times 0 [ 2512.788499] rpcbind: RPC call returned error 22 [ 2512.792004] CPU: 0 PID: 15719 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #266 [ 2512.800618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2512.808065] FAULT_INJECTION: forcing a failure. [ 2512.808065] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2512.809983] Call Trace: [ 2512.824382] dump_stack+0x244/0x39d [ 2512.828020] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2512.833227] ? zap_class+0x640/0x640 [ 2512.836954] should_fail.cold.4+0xa/0x17 [ 2512.841021] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2512.846128] ? find_held_lock+0x36/0x1c0 [ 2512.850217] ? __local_bh_enable_ip+0x160/0x260 [ 2512.854891] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2512.859563] ? zap_class+0x640/0x640 [ 2512.863277] ? _raw_spin_unlock_bh+0x30/0x40 [ 2512.867692] ? find_held_lock+0x36/0x1c0 [ 2512.871775] ? perf_trace_sched_process_exec+0x860/0x860 [ 2512.877236] ? lock_downgrade+0x900/0x900 [ 2512.881397] __should_failslab+0x124/0x180 [ 2512.885639] should_failslab+0x9/0x14 [ 2512.889441] kmem_cache_alloc_node_trace+0x270/0x740 [ 2512.894624] __get_vm_area_node+0x130/0x3a0 [ 2512.898946] ? memcpy+0x45/0x50 [ 2512.902242] __vmalloc_node_range+0xc4/0x750 [ 2512.906690] ? compat_do_replace+0x1b3/0x8e0 [ 2512.911102] ? ebt_check_entry+0x2180/0x2180 [ 2512.915510] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 2512.920970] ? compat_do_replace+0x1b3/0x8e0 [ 2512.925382] vmalloc+0x6f/0x80 [ 2512.928577] ? compat_do_replace+0x1b3/0x8e0 [ 2512.932989] compat_do_replace+0x1b3/0x8e0 [ 2512.937251] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2512.942790] ? apparmor_capable+0x355/0x6c0 [ 2512.947114] ? do_ebt_set_ctl+0x110/0x110 [ 2512.951272] ? apparmor_cred_transfer+0x590/0x590 [ 2512.956117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2512.961772] ? cap_capable+0x1f9/0x260 [ 2512.965672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2512.971235] ? ns_capable_common+0x13f/0x170 [ 2512.975650] compat_do_ebt_set_ctl+0x2a3/0x31b [ 2512.980249] ? perf_trace_sched_process_exec+0x860/0x860 [ 2512.985706] ? compat_do_replace+0x8e0/0x8e0 [ 2512.990131] ? mutex_unlock+0xd/0x10 [ 2512.993852] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 2512.999135] compat_nf_setsockopt+0x9b/0x140 [ 2513.003547] ? compat_do_replace+0x8e0/0x8e0 [ 2513.007971] compat_ip_setsockopt+0xff/0x140 [ 2513.012387] inet_csk_compat_setsockopt+0x97/0x120 [ 2513.017335] ? ip_setsockopt+0xf0/0xf0 [ 2513.021230] compat_tcp_setsockopt+0x49/0x80 [ 2513.025645] compat_sock_common_setsockopt+0xb4/0x150 [ 2513.030834] ? tcp_setsockopt+0xe0/0xe0 [ 2513.034813] ? sock_common_setsockopt+0xe0/0xe0 [ 2513.039482] __compat_sys_setsockopt+0x1b3/0x860 [ 2513.044243] ? __compat_sys_getsockopt+0x8a0/0x8a0 [ 2513.049194] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2513.053782] ? trace_hardirqs_on+0xbd/0x310 [ 2513.058104] ? __ia32_sys_read+0xb0/0xb0 [ 2513.062165] ? entry_SYSENTER_compat+0x70/0x7f [ 2513.066765] ? trace_hardirqs_off_caller+0x310/0x310 [ 2513.071870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2513.077415] __ia32_compat_sys_setsockopt+0xbd/0x150 [ 2513.082527] do_fast_syscall_32+0x34d/0xfb2 [ 2513.086859] ? do_int80_syscall_32+0x890/0x890 [ 2513.091445] ? entry_SYSENTER_compat+0x68/0x7f [ 2513.096065] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2513.101095] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2513.105940] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2513.110783] ? trace_hardirqs_on_caller+0x310/0x310 [ 2513.115801] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2513.120838] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2513.125858] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2513.130701] entry_SYSENTER_compat+0x70/0x7f [ 2513.135105] RIP: 0023:0xf7f11a29 [ 2513.138472] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2513.157802] RSP: 002b:00000000f5f0d0cc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 2513.165504] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 2513.172768] RDX: 0000000000000080 RSI: 0000000020000dc0 RDI: 0000000000000360 [ 2513.180033] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2513.187295] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2513.194559] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2513.201850] CPU: 1 PID: 15728 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #266 [ 2513.209749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2513.219109] Call Trace: [ 2513.221748] dump_stack+0x244/0x39d [ 2513.225415] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2513.230623] should_fail.cold.4+0xa/0x17 [ 2513.235095] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2513.240211] ? zap_class+0x640/0x640 [ 2513.243935] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2513.249478] ? _kstrtoull+0x188/0x250 [ 2513.253298] ? mark_held_locks+0x130/0x130 [ 2513.257641] ? find_held_lock+0x36/0x1c0 [ 2513.261731] ? zap_class+0x640/0x640 [ 2513.265458] ? get_pid_task+0xd6/0x1a0 [ 2513.269358] ? lock_downgrade+0x900/0x900 [ 2513.273511] ? check_preemption_disabled+0x48/0x280 [ 2513.278540] ? find_held_lock+0x36/0x1c0 [ 2513.282610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2513.288164] ? should_fail+0x22d/0xd01 [ 2513.292063] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2513.297173] ? __f_unlock_pos+0x19/0x20 [ 2513.301170] __alloc_pages_nodemask+0x366/0xea0 [ 2513.305846] ? proc_fail_nth_write+0x9e/0x210 [ 2513.310347] ? proc_cwd_link+0x1d0/0x1d0 [ 2513.314422] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 2513.319451] ? find_held_lock+0x36/0x1c0 [ 2513.323544] ? trace_hardirqs_off+0xb8/0x310 [ 2513.327967] cache_grow_begin+0xa5/0x8c0 [ 2513.332035] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2513.337577] ? check_preemption_disabled+0x48/0x280 [ 2513.342606] kmem_cache_alloc+0x66b/0x730 [ 2513.346762] ? do_fast_syscall_32+0x150/0xfb2 [ 2513.351271] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2513.355863] getname_flags+0xd0/0x590 [ 2513.359672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2513.365229] __ia32_compat_sys_execveat+0xd4/0x140 [ 2513.370180] do_fast_syscall_32+0x34d/0xfb2 [ 2513.374518] ? do_int80_syscall_32+0x890/0x890 [ 2513.379106] ? entry_SYSENTER_compat+0x68/0x7f [ 2513.383707] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2513.388727] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2513.393574] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2513.398535] ? trace_hardirqs_on_caller+0x310/0x310 [ 2513.403910] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2513.408936] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2513.413965] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2513.418819] entry_SYSENTER_compat+0x70/0x7f [ 2513.423227] RIP: 0023:0xf7f79a29 [ 2513.426600] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2513.445504] RSP: 002b:00000000f5f540cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2513.453220] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 [ 2513.460491] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2513.467763] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2513.475035] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2513.478458] syz-executor3: vmalloc: allocation failure: 384 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 2513.482301] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2513.503953] FAULT_INJECTION: forcing a failure. [ 2513.503953] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2513.505038] syz-executor3 cpuset=syz3 mems_allowed=0 [ 2513.515773] CPU: 1 PID: 15735 Comm: syz-executor1 Not tainted 4.20.0-rc5+ #266 [ 2513.515783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2513.515789] Call Trace: [ 2513.515815] dump_stack+0x244/0x39d [ 2513.515838] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2513.515866] should_fail.cold.4+0xa/0x17 [ 2513.515886] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2513.515902] ? zap_class+0x640/0x640 [ 2513.515916] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2513.515932] ? _kstrtoull+0x188/0x250 [ 2513.571230] ? mark_held_locks+0x130/0x130 [ 2513.575468] ? find_held_lock+0x36/0x1c0 [ 2513.579540] ? zap_class+0x640/0x640 [ 2513.583266] ? get_pid_task+0xd6/0x1a0 [ 2513.587158] ? lock_downgrade+0x900/0x900 [ 2513.591308] ? check_preemption_disabled+0x48/0x280 [ 2513.596338] ? find_held_lock+0x36/0x1c0 [ 2513.600413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2513.605954] ? should_fail+0x22d/0xd01 [ 2513.609850] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2513.614960] ? __f_unlock_pos+0x19/0x20 [ 2513.618947] __alloc_pages_nodemask+0x366/0xea0 [ 2513.623619] ? proc_fail_nth_write+0x9e/0x210 [ 2513.628133] ? proc_cwd_link+0x1d0/0x1d0 [ 2513.632204] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 2513.637234] ? find_held_lock+0x36/0x1c0 [ 2513.641328] ? trace_hardirqs_off+0xb8/0x310 [ 2513.645743] cache_grow_begin+0xa5/0x8c0 [ 2513.649818] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2513.655376] ? check_preemption_disabled+0x48/0x280 [ 2513.660403] kmem_cache_alloc+0x66b/0x730 [ 2513.664570] ? do_fast_syscall_32+0x150/0xfb2 [ 2513.669076] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2513.673679] getname_flags+0xd0/0x590 [ 2513.677487] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2513.683035] __ia32_compat_sys_execveat+0xd4/0x140 [ 2513.687978] do_fast_syscall_32+0x34d/0xfb2 [ 2513.692312] ? do_int80_syscall_32+0x890/0x890 [ 2513.696901] ? entry_SYSENTER_compat+0x68/0x7f [ 2513.701486] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2513.706502] ? trace_hardirqs_off_thunk+0x1a/0x1c 02:23:48 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x10000, 0x0) write$P9_RWRITE(r1, &(0x7f00000000c0)={0xb, 0x77, 0x2, 0x100000001}, 0xb) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) [ 2513.711347] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2513.716197] ? trace_hardirqs_on_caller+0x310/0x310 [ 2513.721227] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2513.726250] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2513.731278] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2513.736138] entry_SYSENTER_compat+0x70/0x7f [ 2513.740549] RIP: 0023:0xf7fc9a29 [ 2513.743924] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 02:23:48 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2513.762823] RSP: 002b:00000000f5fa40cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2513.770531] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 0000000020000000 [ 2513.770540] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2513.770548] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2513.770555] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2513.770564] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2513.827409] CPU: 0 PID: 15719 Comm: syz-executor3 Not tainted 4.20.0-rc5+ #266 [ 2513.834942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2513.844301] Call Trace: [ 2513.846906] dump_stack+0x244/0x39d [ 2513.850561] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2513.855769] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2513.861320] warn_alloc.cold.116+0xb7/0x1bd [ 2513.865653] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 2513.870501] ? __get_vm_area_node+0x130/0x3a0 [ 2513.875004] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2513.880039] ? __get_vm_area_node+0x2e5/0x3a0 [ 2513.884536] ? memcpy+0x45/0x50 [ 2513.887824] __vmalloc_node_range+0x472/0x750 [ 2513.892319] ? ebt_check_entry+0x2180/0x2180 [ 2513.896735] ? refcount_inc_not_zero_checked+0x2f0/0x2f0 [ 2513.902199] ? compat_do_replace+0x1b3/0x8e0 [ 2513.906717] vmalloc+0x6f/0x80 [ 2513.909920] ? compat_do_replace+0x1b3/0x8e0 [ 2513.914354] compat_do_replace+0x1b3/0x8e0 [ 2513.918591] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2513.924139] ? apparmor_capable+0x355/0x6c0 [ 2513.928461] ? do_ebt_set_ctl+0x110/0x110 [ 2513.932613] ? apparmor_cred_transfer+0x590/0x590 [ 2513.937458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2513.942996] ? cap_capable+0x1f9/0x260 [ 2513.946895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2513.952431] ? ns_capable_common+0x13f/0x170 [ 2513.956852] compat_do_ebt_set_ctl+0x2a3/0x31b [ 2513.961443] ? perf_trace_sched_process_exec+0x860/0x860 [ 2513.966897] ? compat_do_replace+0x8e0/0x8e0 [ 2513.971316] ? mutex_unlock+0xd/0x10 02:23:48 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="d8a808c5d80b15f6cbf796822fda2090908225e449414a1977cae628d87ce13d7752e7873a143d2a729e6eebc84de9053d90af30c52d2a428e1703622bcadff542b341d325a2f278e3e02b13fe3b017bf920aa8b2932b6ebe257fa802f34e765406c22c4ad5fe1b003d7082fc5f2592bae1b2e4970adf08a88", 0x79, 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000380)="dae4ac2905a8e6af3ac7406333bc21bf2b491cc3a849fc4adb78a9dc379b9dd4e51996eb8bbc1db0e8d60c1d48f154bda2e6ad29d54ff82a396dcc76d7f1caafa808fd8072b140bfe76ce166b4fea02c", 0x50, 0xfffffffffffffffa) keyctl$search(0xa, r1, &(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={'syz', 0x0}, r2) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2513.975037] ? nf_sockopt_find.constprop.0+0x221/0x290 [ 2513.980333] compat_nf_setsockopt+0x9b/0x140 [ 2513.984756] ? compat_do_replace+0x8e0/0x8e0 [ 2513.989179] compat_ip_setsockopt+0xff/0x140 [ 2513.993604] inet_csk_compat_setsockopt+0x97/0x120 [ 2513.998537] ? ip_setsockopt+0xf0/0xf0 [ 2514.002433] compat_tcp_setsockopt+0x49/0x80 [ 2514.006855] compat_sock_common_setsockopt+0xb4/0x150 [ 2514.012050] ? tcp_setsockopt+0xe0/0xe0 [ 2514.016057] ? sock_common_setsockopt+0xe0/0xe0 [ 2514.020747] __compat_sys_setsockopt+0x1b3/0x860 [ 2514.025514] ? __compat_sys_getsockopt+0x8a0/0x8a0 [ 2514.030460] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2514.035055] ? trace_hardirqs_on+0xbd/0x310 [ 2514.039388] ? __ia32_sys_read+0xb0/0xb0 [ 2514.043456] ? entry_SYSENTER_compat+0x70/0x7f [ 2514.048048] ? trace_hardirqs_off_caller+0x310/0x310 [ 2514.053171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2514.058721] __ia32_compat_sys_setsockopt+0xbd/0x150 [ 2514.063833] do_fast_syscall_32+0x34d/0xfb2 [ 2514.068163] ? do_int80_syscall_32+0x890/0x890 [ 2514.072757] ? entry_SYSENTER_compat+0x68/0x7f [ 2514.077432] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2514.082462] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2514.087313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2514.092169] ? trace_hardirqs_on_caller+0x310/0x310 [ 2514.097196] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2514.102221] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2514.107256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2514.112126] entry_SYSENTER_compat+0x70/0x7f [ 2514.116537] RIP: 0023:0xf7f11a29 [ 2514.119910] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2514.138815] RSP: 002b:00000000f5f0d0cc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 2514.146531] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 2514.153805] RDX: 0000000000000080 RSI: 0000000020000dc0 RDI: 0000000000000360 [ 2514.161093] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2514.168362] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 02:23:48 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2514.175633] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:23:48 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2514.450429] Mem-Info: [ 2514.456986] active_anon:162372 inactive_anon:4731 isolated_anon:0 [ 2514.456986] active_file:7792 inactive_file:58839 isolated_file:0 [ 2514.456986] unevictable:0 dirty:109 writeback:0 unstable:0 [ 2514.456986] slab_reclaimable:77703 slab_unreclaimable:216141 [ 2514.456986] mapped:55037 shmem:5088 pagetables:2986 bounce:0 [ 2514.456986] free:996536 free_pcp:936 free_cma:0 [ 2514.492302] Node 0 active_anon:649388kB inactive_anon:18924kB active_file:31168kB inactive_file:235356kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:220148kB dirty:436kB writeback:0kB shmem:20352kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 423936kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2514.539775] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2514.607873] lowmem_reserve[]: 0 2818 6321 6321 [ 2514.618069] Node 0 DMA32 free:2887356kB min:30052kB low:37564kB high:45076kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2888780kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1424kB local_pcp:72kB free_cma:0kB 02:23:49 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getgroups(0x6, &(0x7f0000000040)=[0x0, 0xee01, 0xee00, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) r3 = getgid() fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x7, &(0x7f00000003c0)=[r2, r3, r4, r5, r6, r7, r8]) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000400)=0x10, 0x4) [ 2514.684188] lowmem_reserve[]: 0 0 3503 3503 [ 2514.691878] Node 0 Normal free:1094928kB min:37364kB low:46704kB high:56044kB active_anon:640860kB inactive_anon:18924kB active_file:31168kB inactive_file:235356kB unevictable:0kB writepending:436kB present:4718592kB managed:3587816kB mlocked:0kB kernel_stack:9632kB pagetables:10612kB bounce:0kB free_pcp:2612kB local_pcp:1156kB free_cma:0kB [ 2514.751561] lowmem_reserve[]: 0 0 0 0 [ 2514.763491] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 2514.870130] Node 0 DMA32: 3*4kB (M) 0*8kB 1*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 2*256kB (M) 3*512kB (M) 3*1024kB (M) 1*2048kB (M) 703*4096kB (M) = 2887356kB [ 2514.953358] Node 0 Normal: 657*4kB (UME) 259*8kB (UME) 1252*16kB (UME) 748*32kB (UME) 425*64kB (UME) 190*128kB (UM) 83*256kB (UM) 35*512kB (M) 13*1024kB (UM) 10*2048kB (UM) 226*4096kB (ME) = 1098844kB [ 2515.048533] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 02:23:49 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x4000) [ 2515.102531] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2515.153022] 71758 total pagecache pages [ 2515.157163] 0 pages in swap cache [ 2515.176834] Swap cache stats: add 0, delete 0, find 0/0 [ 2515.197157] Free swap = 0kB 02:23:49 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2515.202378] Total swap = 0kB [ 2515.205668] 1965979 pages RAM [ 2515.208987] 0 pages HighMem/MovableOnly [ 2515.213082] 342853 pages reserved [ 2515.216706] 0 pages cma reserved [ 2517.748669] device bridge_slave_1 left promiscuous mode [ 2517.754235] bridge0: port 2(bridge_slave_1) entered disabled state 02:23:52 executing program 2 (fault-call:6 fault-nth:2): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:23:52 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x100) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_buf(r0, 0x29, 0x14, &(0x7f0000000280)=""/151, &(0x7f0000000380)=0x97) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000000)=""/123, &(0x7f0000000080)=0x7b) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000003c0)='syzkaller0\x00') perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsync(r0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={r1, 0x20, &(0x7f00000001c0)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x4e20, @empty}]}, &(0x7f0000000240)=0xc) 02:23:52 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f00000000c0)=0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002f00)={0x14, 0x1c, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x800000000000000}, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000240)=0x7, 0x4) 02:23:52 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1002) 02:23:52 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, 0x0, 0x0, 0x0, 0x1000) [ 2517.797466] device bridge_slave_0 left promiscuous mode [ 2517.802934] bridge0: port 1(bridge_slave_0) entered disabled state [ 2517.860843] kernel msg: ebtables bug: please report to author: bad policy [ 2517.942850] FAULT_INJECTION: forcing a failure. [ 2517.942850] name failslab, interval 1, probability 0, space 0, times 0 02:23:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xffffff7f00000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2518.022093] CPU: 0 PID: 15814 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #266 [ 2518.029517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2518.038880] Call Trace: [ 2518.041488] dump_stack+0x244/0x39d [ 2518.045141] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2518.050354] ? print_usage_bug+0xc0/0xc0 [ 2518.054434] should_fail.cold.4+0xa/0x17 [ 2518.058510] ? __lock_acquire+0x62f/0x4c20 [ 2518.062761] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2518.067882] ? __lock_acquire+0x62f/0x4c20 [ 2518.072136] ? __lock_acquire+0x62f/0x4c20 [ 2518.076382] ? find_held_lock+0x36/0x1c0 [ 2518.080469] ? check_preemption_disabled+0x48/0x280 [ 2518.085488] ? perf_trace_sched_process_exec+0x860/0x860 [ 2518.090959] __should_failslab+0x124/0x180 [ 2518.095200] should_failslab+0x9/0x14 [ 2518.099007] kmem_cache_alloc+0x2be/0x730 [ 2518.103157] ? print_usage_bug+0xc0/0xc0 [ 2518.107224] ? zap_class+0x640/0x640 [ 2518.110948] dup_fd+0x11c/0xf50 [ 2518.114249] ? __fdget+0x20/0x20 [ 2518.117621] ? find_held_lock+0x36/0x1c0 [ 2518.121709] ? is_bpf_text_address+0xac/0x170 [ 2518.126212] ? lock_downgrade+0x900/0x900 [ 2518.130366] ? check_preemption_disabled+0x48/0x280 [ 2518.135389] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2518.140322] ? kasan_check_read+0x11/0x20 [ 2518.144472] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2518.149755] ? rcu_softirq_qs+0x20/0x20 [ 2518.153731] ? rcu_softirq_qs+0x20/0x20 [ 2518.157796] ? unwind_dump+0x190/0x190 [ 2518.161709] unshare_fd+0x200/0x2c0 [ 2518.165344] ? mmdrop_async_fn+0x20/0x20 [ 2518.169409] ? kernel_text_address+0x79/0xf0 [ 2518.173822] ? __kernel_text_address+0xd/0x40 [ 2518.178322] ? unwind_get_return_address+0x61/0xa0 [ 2518.183262] ? __save_stack_trace+0x8d/0xf0 [ 2518.187594] unshare_files+0xab/0x2d0 [ 2518.191402] ? __ia32_sys_unshare+0x40/0x40 [ 2518.195737] ? save_stack+0x43/0xd0 [ 2518.199369] ? kasan_kmalloc+0xc7/0xe0 [ 2518.203263] ? kasan_slab_alloc+0x12/0x20 [ 2518.207423] __do_execve_file.isra.33+0x360/0x25d0 [ 2518.212370] ? prepare_bprm_creds+0x120/0x120 [ 2518.216881] ? usercopy_warn+0x110/0x110 [ 2518.220958] ? check_preemption_disabled+0x48/0x280 [ 2518.225988] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2518.231536] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2518.237081] ? strncpy_from_user+0x411/0x5a0 [ 2518.241501] ? digsig_verify+0x1530/0x1530 [ 2518.245739] ? kmem_cache_alloc+0x33a/0x730 [ 2518.250068] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2518.254677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2518.260230] __ia32_compat_sys_execveat+0xf3/0x140 [ 2518.265183] do_fast_syscall_32+0x34d/0xfb2 [ 2518.269513] ? do_int80_syscall_32+0x890/0x890 [ 2518.274102] ? entry_SYSENTER_compat+0x68/0x7f [ 2518.278700] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2518.283722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2518.288571] ? trace_hardirqs_on_caller+0x310/0x310 [ 2518.293591] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2518.298613] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 2518.305280] ? __switch_to_asm+0x40/0x70 [ 2518.309341] ? __switch_to_asm+0x34/0x70 [ 2518.313419] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2518.318274] entry_SYSENTER_compat+0x70/0x7f [ 2518.322687] RIP: 0023:0xf7f79a29 [ 2518.326058] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2518.345287] RSP: 002b:00000000f5f540cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2518.353001] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 [ 2518.360271] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2518.367546] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2518.374818] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2518.382094] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2518.407473] team0 (unregistering): Port device team_slave_1 removed [ 2518.444419] team0 (unregistering): Port device team_slave_0 removed [ 2518.445830] kernel msg: ebtables bug: please report to author: bad policy [ 2518.453531] IPVS: ftp: loaded support on port[0] = 21 [ 2518.494176] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2518.509403] kernel msg: ebtables bug: please report to author: bad policy 02:23:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2518.554444] bond0 (unregistering): Releasing backup interface bond_slave_0 02:23:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x38030000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:23:53 executing program 0 (fault-call:2 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) [ 2518.694137] bond0 (unregistering): Released all slaves 02:23:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:23:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000000)=r0, 0x4) 02:23:53 executing program 2 (fault-call:6 fault-nth:3): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xfeffff07, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2519.154760] FAULT_INJECTION: forcing a failure. [ 2519.154760] name failslab, interval 1, probability 0, space 0, times 0 [ 2519.178162] CPU: 0 PID: 15860 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #266 [ 2519.185554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2519.194932] Call Trace: [ 2519.197534] dump_stack+0x244/0x39d [ 2519.201193] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2519.206401] ? is_bpf_text_address+0xd3/0x170 [ 2519.210920] should_fail.cold.4+0xa/0x17 [ 2519.214991] ? __save_stack_trace+0x8d/0xf0 [ 2519.219327] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2519.224450] ? save_stack+0xa9/0xd0 [ 2519.228083] ? kasan_kmalloc+0xc7/0xe0 [ 2519.231973] ? kasan_slab_alloc+0x12/0x20 [ 2519.236617] ? kmem_cache_alloc+0x12e/0x730 [ 2519.240942] ? dup_fd+0x11c/0xf50 [ 2519.244399] ? unshare_files+0xab/0x2d0 [ 2519.248380] ? __do_execve_file.isra.33+0x360/0x25d0 [ 2519.253484] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 2519.258605] ? find_held_lock+0x36/0x1c0 [ 2519.262753] ? nl80211_add_commands_unsplit+0xa8/0x2190 [ 2519.268139] ? perf_trace_sched_process_exec+0x860/0x860 [ 2519.273601] ? dup_fd+0xa42/0xf50 [ 2519.277067] __should_failslab+0x124/0x180 [ 2519.281313] should_failslab+0x9/0x14 [ 2519.285116] kmem_cache_alloc_trace+0x2d7/0x750 [ 2519.289787] ? do_raw_spin_unlock+0xa7/0x330 [ 2519.294203] ? do_raw_spin_trylock+0x270/0x270 [ 2519.298789] ? __lock_is_held+0xb5/0x140 [ 2519.302860] alloc_fdtable+0x89/0x280 [ 2519.306670] dup_fd+0xa71/0xf50 [ 2519.309962] ? __fdget+0x20/0x20 [ 2519.313331] ? find_held_lock+0x36/0x1c0 [ 2519.317404] ? is_bpf_text_address+0xac/0x170 [ 2519.321904] ? lock_downgrade+0x900/0x900 [ 2519.326061] ? check_preemption_disabled+0x48/0x280 [ 2519.331084] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2519.336021] ? kasan_check_read+0x11/0x20 [ 2519.340172] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2519.345454] ? rcu_softirq_qs+0x20/0x20 [ 2519.349431] ? rcu_softirq_qs+0x20/0x20 [ 2519.353416] ? unwind_dump+0x190/0x190 [ 2519.357326] unshare_fd+0x200/0x2c0 [ 2519.360957] ? mmdrop_async_fn+0x20/0x20 [ 2519.365023] ? kernel_text_address+0x79/0xf0 [ 2519.369437] ? __kernel_text_address+0xd/0x40 [ 2519.373934] ? unwind_get_return_address+0x61/0xa0 [ 2519.378870] ? __save_stack_trace+0x8d/0xf0 [ 2519.383205] unshare_files+0xab/0x2d0 [ 2519.387012] ? __ia32_sys_unshare+0x40/0x40 [ 2519.391344] ? save_stack+0x43/0xd0 [ 2519.394975] ? kasan_kmalloc+0xc7/0xe0 [ 2519.398871] ? kasan_slab_alloc+0x12/0x20 [ 2519.403342] __do_execve_file.isra.33+0x360/0x25d0 [ 2519.408744] ? prepare_bprm_creds+0x120/0x120 [ 2519.413251] ? usercopy_warn+0x110/0x110 [ 2519.417326] ? check_preemption_disabled+0x48/0x280 [ 2519.422358] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2519.427907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2519.433447] ? strncpy_from_user+0x411/0x5a0 [ 2519.437869] ? digsig_verify+0x1530/0x1530 [ 2519.442106] ? kmem_cache_alloc+0x33a/0x730 [ 2519.446432] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2519.451026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2519.456587] __ia32_compat_sys_execveat+0xf3/0x140 [ 2519.461528] do_fast_syscall_32+0x34d/0xfb2 [ 2519.465874] ? do_int80_syscall_32+0x890/0x890 [ 2519.470468] ? entry_SYSENTER_compat+0x68/0x7f [ 2519.475058] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2519.480081] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2519.484925] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2519.489776] ? trace_hardirqs_on_caller+0x310/0x310 [ 2519.494794] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2519.499816] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2519.504841] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2519.509696] entry_SYSENTER_compat+0x70/0x7f [ 2519.514102] RIP: 0023:0xf7f79a29 [ 2519.517476] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2519.536378] RSP: 002b:00000000f5f540cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2519.544093] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 [ 2519.551362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2519.558630] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2519.565901] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2519.573168] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2520.651827] bridge0: port 1(bridge_slave_0) entered blocking state [ 2520.658845] bridge0: port 1(bridge_slave_0) entered disabled state [ 2520.668491] device bridge_slave_0 entered promiscuous mode [ 2520.717661] bridge0: port 2(bridge_slave_1) entered blocking state [ 2520.724230] bridge0: port 2(bridge_slave_1) entered disabled state [ 2520.734073] device bridge_slave_1 entered promiscuous mode [ 2520.783357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2520.832107] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2521.023461] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2521.071312] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2521.292269] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2521.299748] team0: Port device team_slave_0 added [ 2521.343550] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2521.351470] team0: Port device team_slave_1 added [ 2521.395556] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2521.403444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2521.422581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2521.460588] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2521.505620] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2521.512955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2521.531767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2521.571971] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2521.579281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2521.598566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2522.075981] bridge0: port 2(bridge_slave_1) entered blocking state [ 2522.082420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2522.089132] bridge0: port 1(bridge_slave_0) entered blocking state [ 2522.095485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2522.104762] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2522.236670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2523.304586] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2523.402194] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2523.497929] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2523.504067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2523.512482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2523.607904] 8021q: adding VLAN 0 to HW filter on device team0 02:23:59 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, &(0x7f0000000000)=0x2) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) fcntl$getown(r0, 0x9) r1 = gettid() getpgrp(r1) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x15, 0x34, &(0x7f0000000000)=r0, 0x4) 02:23:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x5, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:23:59 executing program 2 (fault-call:6 fault-nth:4): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:23:59 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 02:23:59 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x102f) [ 2524.268999] rpcbind: RPC call returned error 22 [ 2524.275479] rpcbind: RPC call returned error 22 02:23:59 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3000000000000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2524.346485] FAULT_INJECTION: forcing a failure. [ 2524.346485] name failslab, interval 1, probability 0, space 0, times 0 [ 2524.397927] CPU: 1 PID: 16135 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #266 [ 2524.405342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2524.405349] Call Trace: [ 2524.405374] dump_stack+0x244/0x39d [ 2524.405396] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2524.426163] should_fail.cold.4+0xa/0x17 [ 2524.430249] ? kernel_text_address+0x79/0xf0 [ 2524.434673] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2524.439782] ? unwind_get_return_address+0x61/0xa0 [ 2524.444719] ? __save_stack_trace+0x8d/0xf0 [ 2524.444750] ? save_stack+0xa9/0xd0 [ 2524.444770] ? find_held_lock+0x36/0x1c0 [ 2524.456779] ? perf_trace_sched_process_exec+0x860/0x860 [ 2524.460392] kernel msg: ebtables bug: please report to author: bad policy [ 2524.462235] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2524.462263] __should_failslab+0x124/0x180 [ 2524.462283] should_failslab+0x9/0x14 [ 2524.482371] kernel msg: ebtables bug: please report to author: bad policy [ 2524.482751] kmem_cache_alloc_node_trace+0x270/0x740 [ 2524.482770] ? kasan_unpoison_shadow+0x35/0x50 [ 2524.482793] __kmalloc_node+0x3c/0x70 [ 2524.503172] kvmalloc_node+0x65/0xf0 [ 2524.506905] alloc_fdtable+0x145/0x280 [ 2524.510800] dup_fd+0xa71/0xf50 [ 2524.514094] ? __fdget+0x20/0x20 [ 2524.517467] ? find_held_lock+0x36/0x1c0 [ 2524.521553] ? is_bpf_text_address+0xac/0x170 [ 2524.526058] ? lock_downgrade+0x900/0x900 [ 2524.530214] ? check_preemption_disabled+0x48/0x280 [ 2524.535243] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2524.540179] ? kasan_check_read+0x11/0x20 [ 2524.540195] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2524.540209] ? rcu_softirq_qs+0x20/0x20 [ 2524.549613] ? rcu_softirq_qs+0x20/0x20 [ 2524.549627] ? unwind_dump+0x190/0x190 [ 2524.549647] unshare_fd+0x200/0x2c0 [ 2524.549663] ? mmdrop_async_fn+0x20/0x20 [ 2524.569131] ? kernel_text_address+0x79/0xf0 [ 2524.573558] ? __kernel_text_address+0xd/0x40 [ 2524.578073] ? unwind_get_return_address+0x61/0xa0 [ 2524.583017] ? __save_stack_trace+0x8d/0xf0 [ 2524.587372] unshare_files+0xab/0x2d0 [ 2524.591187] ? __ia32_sys_unshare+0x40/0x40 [ 2524.595517] ? save_stack+0x43/0xd0 [ 2524.599151] ? kasan_kmalloc+0xc7/0xe0 [ 2524.599165] ? kasan_slab_alloc+0x12/0x20 [ 2524.599186] __do_execve_file.isra.33+0x360/0x25d0 [ 2524.599211] ? prepare_bprm_creds+0x120/0x120 [ 2524.599231] ? usercopy_warn+0x110/0x110 [ 2524.599254] ? check_preemption_disabled+0x48/0x280 [ 2524.625748] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2524.631304] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2524.636855] ? strncpy_from_user+0x411/0x5a0 [ 2524.641291] ? digsig_verify+0x1530/0x1530 [ 2524.645532] ? kmem_cache_alloc+0x33a/0x730 [ 2524.649865] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2524.654460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2524.660011] __ia32_compat_sys_execveat+0xf3/0x140 [ 2524.664960] do_fast_syscall_32+0x34d/0xfb2 [ 2524.669293] ? do_int80_syscall_32+0x890/0x890 [ 2524.673889] ? entry_SYSENTER_compat+0x68/0x7f [ 2524.678485] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2524.683506] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2524.688355] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2524.693202] ? trace_hardirqs_on_caller+0x310/0x310 [ 2524.698230] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2524.703253] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2524.708282] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2524.713137] entry_SYSENTER_compat+0x70/0x7f [ 2524.717556] RIP: 0023:0xf7f79a29 [ 2524.720928] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2524.727992] rpcbind: RPC call returned error 22 02:23:59 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:23:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3803000000000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:23:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x300, 0x34, &(0x7f0000000000)=r0, 0x4) [ 2524.739829] RSP: 002b:00000000f5f540cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2524.739843] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 [ 2524.739851] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2524.739860] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2524.739868] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2524.739880] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2524.744684] rpcbind: RPC call returned error 22 02:23:59 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2524.819222] rpcbind: RPC call returned error 22 [ 2524.832385] kernel msg: ebtables bug: please report to author: bad policy [ 2524.841139] rpcbind: RPC call returned error 22 02:23:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3c, &(0x7f0000000000)=r0, 0x4) [ 2524.871456] kernel msg: ebtables bug: please report to author: bad policy 02:23:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x500, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2524.983941] rpcbind: RPC call returned error 22 02:23:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xc, &(0x7f0000000000)=r0, 0x4) [ 2525.019099] rpcbind: RPC call returned error 22 02:24:01 executing program 2 (fault-call:6 fault-nth:5): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3f00, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000000)=r0, 0x4) 02:24:01 executing program 4 (fault-call:5 fault-nth:0): syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:01 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x50) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:24:01 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x800, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000001140)={0xfffffffffffffff7, 0x1, 0x1, 0x0, 0xffff}, 0xc) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080), 0x4) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0286429, &(0x7f00000014c0)={r2, 0x4, &(0x7f00000013c0)=[0xd30e, 0x4, 0xed61, 0x40], &(0x7f0000001400)=[0x0], 0x11, 0x9, 0x5, &(0x7f0000001440)=[0x400, 0x2578, 0x1, 0x4, 0x0, 0x52, 0x1, 0x80000001, 0x4], &(0x7f0000001480)=[0x6, 0x5561, 0x0, 0x800, 0x3ff]}) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000011c0)={&(0x7f0000001180)='/dev/vga_arbiter\x00', r1}, 0x10) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000001100)='/dev/vhci\x00', 0x80200, 0x0) ioctl$TIOCEXCL(r1, 0x540c) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) setsockopt$inet6_group_source_req(r3, 0x29, 0x0, &(0x7f0000001200)={0x1ff, {{0xa, 0x4e23, 0x4, @mcast1}}, {{0xa, 0x4e21, 0xffff, @ipv4={[], [], @remote}, 0xa9}}}, 0x104) [ 2526.914993] rpcbind: RPC call returned error 22 [ 2526.923442] rpcbind: RPC call returned error 22 02:24:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xfeffff0700000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2526.960840] FAULT_INJECTION: forcing a failure. [ 2526.960840] name failslab, interval 1, probability 0, space 0, times 0 [ 2526.989853] CPU: 1 PID: 16211 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #266 [ 2526.997257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2526.997263] Call Trace: [ 2526.997288] dump_stack+0x244/0x39d [ 2526.997327] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2526.997355] should_fail.cold.4+0xa/0x17 [ 2526.997375] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2527.027282] ? __f_unlock_pos+0x19/0x20 [ 2527.031275] ? lock_downgrade+0x900/0x900 [ 2527.035438] ? proc_fail_nth_write+0x9e/0x210 [ 2527.035455] ? proc_cwd_link+0x1d0/0x1d0 [ 2527.035484] ? find_held_lock+0x36/0x1c0 [ 2527.043363] kernel msg: ebtables bug: please report to author: bad policy [ 2527.044044] ? perf_trace_sched_process_exec+0x860/0x860 [ 2527.044067] ? check_preemption_disabled+0x48/0x280 [ 2527.055042] __should_failslab+0x124/0x180 [ 2527.055062] should_failslab+0x9/0x14 [ 2527.055079] kmem_cache_alloc+0x2be/0x730 [ 2527.062370] kernel msg: ebtables bug: please report to author: bad policy [ 2527.065520] ? do_fast_syscall_32+0x150/0xfb2 [ 2527.065538] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2527.065559] getname_flags+0xd0/0x590 [ 2527.065578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2527.077731] __ia32_compat_sys_execveat+0xd4/0x140 [ 2527.077754] do_fast_syscall_32+0x34d/0xfb2 [ 2527.077774] ? do_int80_syscall_32+0x890/0x890 [ 2527.077798] ? entry_SYSENTER_compat+0x68/0x7f [ 2527.077816] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2527.101336] FAULT_INJECTION: forcing a failure. [ 2527.101336] name failslab, interval 1, probability 0, space 0, times 0 [ 2527.103117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2527.142565] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2527.147408] ? trace_hardirqs_on_caller+0x310/0x310 [ 2527.147424] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2527.147441] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2527.147461] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2527.147483] entry_SYSENTER_compat+0x70/0x7f [ 2527.171808] RIP: 0023:0xf7f5ba29 [ 2527.175181] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2527.194080] RSP: 002b:00000000f5f360cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2527.201791] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 02:24:01 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x300000000000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x33, &(0x7f0000000000)=r0, 0x4) 02:24:01 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) getpgrp(r1) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2527.209051] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2527.216307] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2527.223563] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2527.230818] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2527.249231] kernel msg: ebtables bug: please report to author: bad policy [ 2527.258530] CPU: 0 PID: 16221 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #266 [ 2527.265912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2527.275267] Call Trace: [ 2527.277877] dump_stack+0x244/0x39d [ 2527.281515] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2527.286727] should_fail.cold.4+0xa/0x17 [ 2527.290806] ? __kernel_text_address+0xd/0x40 [ 2527.295308] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2527.300416] ? __save_stack_trace+0x8d/0xf0 [ 2527.304769] ? save_stack+0xa9/0xd0 [ 2527.308410] ? save_stack+0x43/0xd0 02:24:02 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) clone(0x4000000003fffff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000340)='jfs\x00', 0x0, &(0x7f0000000000)='*^\x00') [ 2527.312038] ? kasan_kmalloc+0xc7/0xe0 [ 2527.315944] ? find_held_lock+0x36/0x1c0 [ 2527.320029] ? rcu_softirq_qs+0x20/0x20 [ 2527.324015] ? perf_trace_sched_process_exec+0x860/0x860 [ 2527.329478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2527.335026] ? check_preemption_disabled+0x48/0x280 [ 2527.340058] __should_failslab+0x124/0x180 [ 2527.344304] should_failslab+0x9/0x14 [ 2527.348117] kmem_cache_alloc_node_trace+0x270/0x740 [ 2527.353242] __kmalloc_node+0x3c/0x70 [ 2527.357055] kvmalloc_node+0x65/0xf0 02:24:02 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x2) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)={r1, r2}) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2527.360791] alloc_fdtable+0xd9/0x280 [ 2527.364601] dup_fd+0xa71/0xf50 [ 2527.367892] ? __fdget+0x20/0x20 [ 2527.371261] ? find_held_lock+0x36/0x1c0 [ 2527.375339] ? is_bpf_text_address+0xac/0x170 [ 2527.379850] ? lock_downgrade+0x900/0x900 [ 2527.384013] ? check_preemption_disabled+0x48/0x280 [ 2527.389043] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2527.394604] ? kasan_check_read+0x11/0x20 [ 2527.398780] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2527.404067] ? rcu_softirq_qs+0x20/0x20 [ 2527.408048] ? rcu_softirq_qs+0x20/0x20 [ 2527.412030] ? unwind_dump+0x190/0x190 [ 2527.415939] unshare_fd+0x200/0x2c0 [ 2527.419573] ? mmdrop_async_fn+0x20/0x20 [ 2527.423636] ? kernel_text_address+0x79/0xf0 [ 2527.428061] ? __kernel_text_address+0xd/0x40 [ 2527.432560] ? unwind_get_return_address+0x61/0xa0 [ 2527.437496] ? __save_stack_trace+0x8d/0xf0 [ 2527.441830] unshare_files+0xab/0x2d0 [ 2527.445641] ? __ia32_sys_unshare+0x40/0x40 [ 2527.449969] ? save_stack+0x43/0xd0 [ 2527.453615] ? kasan_kmalloc+0xc7/0xe0 [ 2527.457509] ? kasan_slab_alloc+0x12/0x20 [ 2527.461667] __do_execve_file.isra.33+0x360/0x25d0 [ 2527.466625] ? prepare_bprm_creds+0x120/0x120 [ 2527.471131] ? usercopy_warn+0x110/0x110 [ 2527.475209] ? check_preemption_disabled+0x48/0x280 [ 2527.480239] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2527.485792] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2527.491336] ? strncpy_from_user+0x411/0x5a0 [ 2527.495772] ? digsig_verify+0x1530/0x1530 [ 2527.500008] ? kmem_cache_alloc+0x33a/0x730 [ 2527.504334] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2527.508924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2527.514470] __ia32_compat_sys_execveat+0xf3/0x140 [ 2527.519417] do_fast_syscall_32+0x34d/0xfb2 [ 2527.523764] ? do_int80_syscall_32+0x890/0x890 [ 2527.528350] ? entry_SYSENTER_compat+0x68/0x7f [ 2527.532937] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2527.537963] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2527.542806] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2527.547655] ? trace_hardirqs_on_caller+0x310/0x310 [ 2527.552676] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2527.557699] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2527.562735] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2527.567592] entry_SYSENTER_compat+0x70/0x7f [ 2527.572001] RIP: 0023:0xf7f79a29 [ 2527.575370] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2527.594379] RSP: 002b:00000000f5f120cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2527.602090] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 0000000020000000 [ 2527.609476] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2527.616758] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2527.624035] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2527.631304] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2527.642275] rpcbind: RPC call returned error 22 [ 2527.643144] rpcbind: RPC call returned error 22 [ 2527.649273] rpcbind: RPC call returned error 22 [ 2527.652556] rpcbind: RPC call returned error 22 [ 2527.660517] kernel msg: ebtables bug: please report to author: bad policy 02:24:02 executing program 2 (fault-call:6 fault-nth:6): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:02 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x40080) 02:24:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x1d, &(0x7f0000000000)=r0, 0x4) 02:24:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x300, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:02 executing program 4 (fault-call:5 fault-nth:1): syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2527.857765] rpcbind: RPC call returned error 22 [ 2527.869072] rpcbind: RPC call returned error 22 [ 2527.898040] FAULT_INJECTION: forcing a failure. [ 2527.898040] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2527.909877] CPU: 1 PID: 16267 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #266 [ 2527.917235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2527.926578] Call Trace: [ 2527.929160] dump_stack+0x244/0x39d [ 2527.932790] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2527.937981] should_fail.cold.4+0xa/0x17 [ 2527.942037] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2527.947133] ? zap_class+0x640/0x640 [ 2527.951011] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2527.956545] ? _kstrtoull+0x188/0x250 [ 2527.960341] ? mark_held_locks+0x130/0x130 [ 2527.964568] ? find_held_lock+0x36/0x1c0 [ 2527.968622] ? zap_class+0x640/0x640 [ 2527.972330] ? get_pid_task+0xd6/0x1a0 [ 2527.976212] ? lock_downgrade+0x900/0x900 [ 2527.980352] ? check_preemption_disabled+0x48/0x280 [ 2527.985362] ? find_held_lock+0x36/0x1c0 [ 2527.989415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2527.994939] ? should_fail+0x22d/0xd01 [ 2527.998817] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2528.003910] ? __f_unlock_pos+0x19/0x20 [ 2528.007875] __alloc_pages_nodemask+0x366/0xea0 [ 2528.012535] ? proc_fail_nth_write+0x9e/0x210 [ 2528.017022] ? proc_cwd_link+0x1d0/0x1d0 [ 2528.021075] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 2528.026082] ? find_held_lock+0x36/0x1c0 [ 2528.030149] ? trace_hardirqs_off+0xb8/0x310 [ 2528.034549] cache_grow_begin+0xa5/0x8c0 [ 2528.038600] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2528.044128] ? check_preemption_disabled+0x48/0x280 [ 2528.049138] kmem_cache_alloc+0x66b/0x730 [ 2528.053275] ? do_fast_syscall_32+0x150/0xfb2 [ 2528.057759] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2528.062335] getname_flags+0xd0/0x590 [ 2528.066124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2528.071651] __ia32_compat_sys_execveat+0xd4/0x140 [ 2528.076576] do_fast_syscall_32+0x34d/0xfb2 [ 2528.080889] ? do_int80_syscall_32+0x890/0x890 [ 2528.085458] ? entry_SYSENTER_compat+0x68/0x7f [ 2528.090030] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2528.095031] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2528.099862] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2528.104702] ? trace_hardirqs_on_caller+0x310/0x310 [ 2528.109708] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2528.114721] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2528.119728] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2528.124561] entry_SYSENTER_compat+0x70/0x7f [ 2528.128956] RIP: 0023:0xf7f5ba29 [ 2528.132313] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2528.151205] RSP: 002b:00000000f5f360cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2528.158901] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 [ 2528.166161] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2528.173421] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2528.180683] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2528.187941] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2528.220388] FAULT_INJECTION: forcing a failure. [ 2528.220388] name failslab, interval 1, probability 0, space 0, times 0 [ 2528.262092] CPU: 0 PID: 16269 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #266 [ 2528.269496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2528.278856] Call Trace: [ 2528.281465] dump_stack+0x244/0x39d [ 2528.285111] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2528.290313] ? prepare_bprm_creds+0x53/0x120 [ 2528.294746] should_fail.cold.4+0xa/0x17 [ 2528.298828] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2528.303951] ? __mutex_lock+0x85e/0x16f0 [ 2528.308019] ? zap_class+0x640/0x640 [ 2528.311753] ? find_held_lock+0x36/0x1c0 [ 2528.315825] ? __lock_is_held+0xb5/0x140 [ 2528.319909] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2528.325453] ? perf_trace_sched_process_exec+0x860/0x860 [ 2528.330916] ? creds_are_invalid+0x140/0x140 [ 2528.336149] __should_failslab+0x124/0x180 [ 2528.340395] should_failslab+0x9/0x14 [ 2528.344199] kmem_cache_alloc+0x2be/0x730 [ 2528.348354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2528.353903] ? check_preemption_disabled+0x48/0x280 [ 2528.358929] prepare_creds+0xab/0x4d0 [ 2528.362734] ? abort_creds+0x2a0/0x2a0 [ 2528.366633] ? __do_execve_file.isra.33+0x425/0x25d0 [ 2528.371756] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2528.376782] prepare_exec_creds+0x11/0xf0 [ 2528.380933] prepare_bprm_creds+0x70/0x120 [ 2528.385170] __do_execve_file.isra.33+0x445/0x25d0 [ 2528.390114] ? prepare_bprm_creds+0x120/0x120 [ 2528.394621] ? usercopy_warn+0x110/0x110 [ 2528.398704] ? check_preemption_disabled+0x48/0x280 [ 2528.404040] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2528.409594] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2528.415144] ? strncpy_from_user+0x411/0x5a0 [ 2528.419566] ? digsig_verify+0x1530/0x1530 [ 2528.423805] ? kmem_cache_alloc+0x33a/0x730 [ 2528.428131] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2528.432724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2528.438273] __ia32_compat_sys_execveat+0xf3/0x140 [ 2528.443217] do_fast_syscall_32+0x34d/0xfb2 [ 2528.447544] ? do_int80_syscall_32+0x890/0x890 [ 2528.452133] ? entry_SYSENTER_compat+0x68/0x7f [ 2528.456723] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2528.461746] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2528.466593] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2528.471452] ? trace_hardirqs_on_caller+0x310/0x310 [ 2528.476476] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2528.481497] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2528.486523] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2528.491386] entry_SYSENTER_compat+0x70/0x7f [ 2528.495796] RIP: 0023:0xf7f79a29 [ 2528.499164] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2528.518150] RSP: 002b:00000000f5f540cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2528.525863] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 [ 2528.533136] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2528.540407] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2528.547681] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2528.554955] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:24:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xb, &(0x7f0000000000)=r0, 0x4) 02:24:13 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6000000000000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:13 executing program 2 (fault-call:6 fault-nth:7): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:13 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) clock_gettime(0x0, &(0x7f0000000040)) write$evdev(r0, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x2a, 0x20000) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) 02:24:13 executing program 4 (fault-call:5 fault-nth:2): syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:13 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) accept4$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10, 0x800) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000080)=0x100) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2539.038216] FAULT_INJECTION: forcing a failure. [ 2539.038216] name failslab, interval 1, probability 0, space 0, times 0 [ 2539.050028] kernel msg: ebtables bug: please report to author: bad policy [ 2539.065457] rpcbind: RPC call returned error 22 [ 2539.073632] kernel msg: ebtables bug: please report to author: bad policy [ 2539.083936] FAULT_INJECTION: forcing a failure. [ 2539.083936] name failslab, interval 1, probability 0, space 0, times 0 [ 2539.085390] CPU: 1 PID: 16287 Comm: syz-executor4 Not tainted 4.20.0-rc5+ #266 [ 2539.102524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2539.111887] Call Trace: [ 2539.114489] dump_stack+0x244/0x39d [ 2539.118136] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2539.123337] ? print_usage_bug+0xc0/0xc0 [ 2539.127412] should_fail.cold.4+0xa/0x17 [ 2539.131479] ? __lock_acquire+0x62f/0x4c20 [ 2539.135730] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2539.140847] ? __lock_acquire+0x62f/0x4c20 [ 2539.145107] ? __lock_acquire+0x62f/0x4c20 [ 2539.149357] ? find_held_lock+0x36/0x1c0 [ 2539.153451] ? check_preemption_disabled+0x48/0x280 [ 2539.158469] ? perf_trace_sched_process_exec+0x860/0x860 [ 2539.163938] __should_failslab+0x124/0x180 [ 2539.168183] should_failslab+0x9/0x14 [ 2539.171983] kmem_cache_alloc+0x2be/0x730 [ 2539.176128] ? print_usage_bug+0xc0/0xc0 [ 2539.180193] ? zap_class+0x640/0x640 [ 2539.183908] dup_fd+0x11c/0xf50 [ 2539.187202] ? __fdget+0x20/0x20 [ 2539.190570] ? find_held_lock+0x36/0x1c0 [ 2539.194651] ? is_bpf_text_address+0xac/0x170 [ 2539.199152] ? lock_downgrade+0x900/0x900 [ 2539.203298] ? check_preemption_disabled+0x48/0x280 [ 2539.208319] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2539.213246] ? kasan_check_read+0x11/0x20 [ 2539.217394] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2539.222671] ? rcu_softirq_qs+0x20/0x20 [ 2539.226647] ? rcu_softirq_qs+0x20/0x20 [ 2539.230617] ? unwind_dump+0x190/0x190 [ 2539.234508] unshare_fd+0x200/0x2c0 [ 2539.238136] ? mmdrop_async_fn+0x20/0x20 [ 2539.242195] ? kernel_text_address+0x79/0xf0 [ 2539.246610] ? __kernel_text_address+0xd/0x40 [ 2539.251106] ? unwind_get_return_address+0x61/0xa0 [ 2539.256042] ? __save_stack_trace+0x8d/0xf0 [ 2539.260378] unshare_files+0xab/0x2d0 [ 2539.264190] ? __ia32_sys_unshare+0x40/0x40 [ 2539.268517] ? save_stack+0x43/0xd0 [ 2539.272144] ? kasan_kmalloc+0xc7/0xe0 [ 2539.276039] ? kasan_slab_alloc+0x12/0x20 [ 2539.280194] __do_execve_file.isra.33+0x360/0x25d0 [ 2539.285139] ? prepare_bprm_creds+0x120/0x120 [ 2539.289637] ? usercopy_warn+0x110/0x110 [ 2539.293709] ? check_preemption_disabled+0x48/0x280 [ 2539.298739] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2539.304283] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2539.309824] ? strncpy_from_user+0x411/0x5a0 [ 2539.314241] ? digsig_verify+0x1530/0x1530 [ 2539.318473] ? kmem_cache_alloc+0x33a/0x730 [ 2539.322799] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2539.327390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2539.332935] __ia32_compat_sys_execveat+0xf3/0x140 [ 2539.337869] do_fast_syscall_32+0x34d/0xfb2 [ 2539.342192] ? do_int80_syscall_32+0x890/0x890 [ 2539.346779] ? entry_SYSENTER_compat+0x68/0x7f [ 2539.351365] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2539.356383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2539.361229] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2539.366071] ? trace_hardirqs_on_caller+0x310/0x310 [ 2539.371098] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2539.376119] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2539.381138] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2539.385990] entry_SYSENTER_compat+0x70/0x7f [ 2539.390394] RIP: 0023:0xf7f5ba29 [ 2539.393761] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2539.413101] RSP: 002b:00000000f5f570cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2539.420810] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 [ 2539.428079] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 02:24:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xffffffff00000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2d, &(0x7f0000000000)=r0, 0x4) 02:24:14 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000180)={{0xa, 0x0, 0x3, 0xbc, 'syz0\x00', 0x3}, 0x2, 0x44, 0x5, r1, 0x8, 0x2, 'syz0\x00', &(0x7f0000000000)=['\'mime_typeem1wlan1vmnet0\x00', 'nfs\x00', 'nfs\x00', 'nfs\x00', 'nfs\x00', 'nfs\x00', 'nfs\x00', '#\x00'], 0x33, [], [0x6, 0x7e03, 0x3452, 0x1]}) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2539.435346] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2539.442613] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2539.449883] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2539.457175] CPU: 0 PID: 16297 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #266 [ 2539.464544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2539.473907] Call Trace: [ 2539.476503] dump_stack+0x244/0x39d [ 2539.480148] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2539.485342] ? prepare_bprm_creds+0x53/0x120 [ 2539.489765] should_fail.cold.4+0xa/0x17 [ 2539.489785] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2539.489809] ? __mutex_lock+0x85e/0x16f0 [ 2539.489827] ? zap_class+0x640/0x640 [ 2539.506715] ? find_held_lock+0x36/0x1c0 [ 2539.510783] ? __lock_is_held+0xb5/0x140 [ 2539.510814] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2539.520382] ? perf_trace_sched_process_exec+0x860/0x860 [ 2539.520403] ? creds_are_invalid+0x140/0x140 [ 2539.520428] __should_failslab+0x124/0x180 [ 2539.520448] should_failslab+0x9/0x14 [ 2539.520463] kmem_cache_alloc+0x2be/0x730 [ 2539.520478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2539.520505] ? check_preemption_disabled+0x48/0x280 [ 2539.553007] prepare_creds+0xab/0x4d0 [ 2539.556824] ? abort_creds+0x2a0/0x2a0 [ 2539.560733] ? __do_execve_file.isra.33+0x425/0x25d0 [ 2539.565847] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2539.570877] prepare_exec_creds+0x11/0xf0 [ 2539.575031] prepare_bprm_creds+0x70/0x120 [ 2539.579278] __do_execve_file.isra.33+0x445/0x25d0 [ 2539.584231] ? prepare_bprm_creds+0x120/0x120 [ 2539.588738] ? usercopy_warn+0x110/0x110 [ 2539.592819] ? check_preemption_disabled+0x48/0x280 [ 2539.597861] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2539.603413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2539.608963] ? strncpy_from_user+0x411/0x5a0 [ 2539.613392] ? digsig_verify+0x1530/0x1530 [ 2539.617632] ? kmem_cache_alloc+0x33a/0x730 [ 2539.621958] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2539.626562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2539.632115] __ia32_compat_sys_execveat+0xf3/0x140 02:24:14 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000000)={0x7ff, 0xfffffffffffffd54, "3700b13f394f8ca885172a896a755417f8110605f428327f1a4b25eefc8ce1d064256d9b98ac5dfc33433569140a861b54541fec8970758bebec05366dcd6a39ae09e40b02a70e5505c60e86706996a716bb77d3ce1398c41fac2775593a19e3c8a0fea787d5dbc72f0ce680ce6c47ee8f2af4095be62e35118ab742f5762a725088f8009d6cabae4d0772c4785afbcb19dbf3a383887cf366ea5047a142ab4920f31b19ec5d08cc16f6cf5443bd259dbbf076d40f1ceb41b39af85b8e5bddf8370d25c40dc583130bd8559b8deefbf812d64e77446b3826e421a2d68af892e052ae40dad11f1cb51755"}) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_config_ext, 0xa00000400, 0x0, 0x7ff, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)=0x0) getpgrp(r1) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2539.637059] do_fast_syscall_32+0x34d/0xfb2 [ 2539.641388] ? do_int80_syscall_32+0x890/0x890 [ 2539.645977] ? entry_SYSENTER_compat+0x68/0x7f [ 2539.650574] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2539.655595] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2539.660447] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2539.665300] ? trace_hardirqs_on_caller+0x310/0x310 [ 2539.670326] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2539.675348] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2539.675371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2539.675394] entry_SYSENTER_compat+0x70/0x7f [ 2539.689641] RIP: 0023:0xf7f79a29 [ 2539.689658] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2539.689666] RSP: 002b:00000000f5f540cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2539.719640] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 [ 2539.726922] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2539.727786] rpcbind: RPC call returned error 22 [ 2539.734191] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2539.734204] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2539.734213] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2539.745483] rpcbind: RPC call returned error 22 [ 2539.775387] kernel msg: ebtables bug: please report to author: bad policy [ 2539.795339] FS-Cache: Duplicate cookie detected [ 2539.796238] kernel msg: ebtables bug: please report to author: bad policy [ 2539.800300] FS-Cache: O-cookie c=000000004b61c0ef [p=00000000d521cfab fl=222 nc=0 na=1] [ 2539.815438] FS-Cache: O-cookie d=00000000a5cfa8b5 n=00000000f95fcb30 [ 2539.821973] FS-Cache: O-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2539.829638] FS-Cache: N-cookie c=000000006a25b721 [p=00000000d521cfab fl=2 nc=0 na=1] [ 2539.837645] FS-Cache: N-cookie d=00000000a5cfa8b5 n=00000000a71a6d25 02:24:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x5, &(0x7f0000000000)=r0, 0x4) 02:24:14 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@xdp, &(0x7f00000000c0)=0x80, 0x800) getsockopt$inet6_int(r0, 0x29, 0x13, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() setresgid(r2, r3, r4) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2539.844141] FS-Cache: N-key=[22] '02000a00000000000000ff0700000000000000000000' [ 2539.882336] rpcbind: RPC call returned error 22 [ 2539.890090] rpcbind: RPC call returned error 22 02:24:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3f00000000000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:14 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x82000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syslog(0xf, &(0x7f0000000000)=""/123, 0x7b) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2539.909148] rpcbind: RPC call returned error 22 [ 2539.917750] rpcbind: RPC call returned error 22 [ 2539.990684] kernel msg: ebtables bug: please report to author: bad policy [ 2540.011074] kernel msg: ebtables bug: please report to author: bad policy [ 2540.026135] rpcbind: RPC call returned error 22 [ 2540.048695] rpcbind: RPC call returned error 22 02:24:16 executing program 2 (fault-call:6 fault-nth:8): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x1a, &(0x7f0000000000)=r0, 0x4) 02:24:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) syz_extract_tcp_res$synack(&(0x7f0000000340), 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$cec(&(0x7f0000000380)='/dev/cec#\x00', 0x3, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000028c0)=0x14) connect$can_bcm(r4, &(0x7f0000002900)={0x1d, r5}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000280)=0xa8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000002c0)={r6, 0x2, 0x30, 0x5, 0x8001}, &(0x7f0000000300)=0x18) recvmsg(r3, &(0x7f0000000180)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/40, 0x28}], 0x1, 0x0, 0x0, 0x6}, 0x40000041) setxattr$security_smack_transmute(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x3) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r3, &(0x7f00000005c0)={r3, r0, 0x8d1}) 02:24:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x400000000000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:16 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:24:16 executing program 4 (fault-call:5 fault-nth:3): syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:16 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) getpgrp(r1) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2541.967394] rpcbind: RPC call returned error 22 [ 2541.977146] kernel msg: ebtables bug: please report to author: bad policy 02:24:16 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x6, &(0x7f0000000000)=r0, 0x4) [ 2542.008755] kernel msg: ebtables bug: please report to author: bad policy 02:24:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x1000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2542.077369] FAULT_INJECTION: forcing a failure. [ 2542.077369] name failslab, interval 1, probability 0, space 0, times 0 [ 2542.097606] rpcbind: RPC call returned error 22 [ 2542.110759] rpcbind: RPC call returned error 22 [ 2542.147122] CPU: 1 PID: 16376 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #266 [ 2542.154541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2542.163903] Call Trace: [ 2542.166511] dump_stack+0x244/0x39d [ 2542.170156] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2542.175360] ? lock_downgrade+0x900/0x900 [ 2542.179521] ? check_preemption_disabled+0x48/0x280 [ 2542.179548] should_fail.cold.4+0xa/0x17 [ 2542.188601] ? rcu_softirq_qs+0x20/0x20 [ 2542.188618] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2542.188641] ? is_bpf_text_address+0xd3/0x170 [ 2542.188658] ? kernel_text_address+0x79/0xf0 [ 2542.188679] ? zap_class+0x640/0x640 [ 2542.210321] ? unwind_get_return_address+0x61/0xa0 [ 2542.215264] ? __save_stack_trace+0x8d/0xf0 [ 2542.219607] ? find_held_lock+0x36/0x1c0 [ 2542.223683] ? __lock_is_held+0xb5/0x140 [ 2542.227767] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 2542.232886] ? perf_trace_sched_process_exec+0x860/0x860 [ 2542.238358] __should_failslab+0x124/0x180 [ 2542.242610] should_failslab+0x9/0x14 [ 2542.246421] kmem_cache_alloc_trace+0x2d7/0x750 [ 2542.251101] ? __might_sleep+0x95/0x190 [ 2542.255094] apparmor_file_alloc_security+0x17b/0xac0 [ 2542.260300] ? apparmor_path_rename+0xcd0/0xcd0 [ 2542.264986] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2542.270010] ? kmem_cache_alloc+0x33a/0x730 [ 2542.274338] security_file_alloc+0x4c/0xa0 [ 2542.278581] __alloc_file+0x12a/0x470 [ 2542.282389] ? file_free_rcu+0xd0/0xd0 [ 2542.286298] ? __lock_acquire+0x62f/0x4c20 [ 2542.290551] ? find_held_lock+0x36/0x1c0 [ 2542.294618] alloc_empty_file+0x72/0x170 [ 2542.298682] path_openat+0x170/0x5150 [ 2542.302475] ? lock_downgrade+0x900/0x900 [ 2542.306618] ? check_preemption_disabled+0x48/0x280 [ 2542.311627] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2542.316552] ? kasan_check_read+0x11/0x20 [ 2542.320695] ? print_usage_bug+0xc0/0xc0 [ 2542.324748] ? print_usage_bug+0xc0/0xc0 [ 2542.328801] ? rcu_softirq_qs+0x20/0x20 [ 2542.332765] ? unwind_dump+0x190/0x190 [ 2542.336645] ? path_lookupat.isra.43+0xc00/0xc00 [ 2542.341396] ? is_bpf_text_address+0xd3/0x170 [ 2542.345879] ? kernel_text_address+0x79/0xf0 [ 2542.350290] ? __lock_acquire+0x62f/0x4c20 [ 2542.354523] ? mark_held_locks+0x130/0x130 [ 2542.358744] ? kasan_kmalloc+0xc7/0xe0 [ 2542.362622] ? kasan_slab_alloc+0x12/0x20 [ 2542.366758] ? kmem_cache_alloc+0x12e/0x730 [ 2542.371070] ? prepare_creds+0xab/0x4d0 [ 2542.375028] ? prepare_exec_creds+0x11/0xf0 [ 2542.379338] ? prepare_bprm_creds+0x70/0x120 [ 2542.383732] ? __do_execve_file.isra.33+0x445/0x25d0 [ 2542.388822] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 2542.393914] ? do_fast_syscall_32+0x34d/0xfb2 [ 2542.398840] ? entry_SYSENTER_compat+0x70/0x7f [ 2542.403418] ? percpu_ref_put_many+0x11c/0x260 [ 2542.407993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2542.413516] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 2542.418971] ? refcount_add_not_zero_checked+0x330/0x330 [ 2542.424424] do_filp_open+0x255/0x380 [ 2542.428213] ? may_open_dev+0x100/0x100 [ 2542.432178] ? zap_class+0x640/0x640 [ 2542.435881] ? zap_class+0x640/0x640 [ 2542.439584] ? apparmor_cred_prepare+0x30c/0x5a0 [ 2542.444331] ? apparmor_task_free+0x1e0/0x1e0 [ 2542.448819] ? find_held_lock+0x36/0x1c0 [ 2542.452885] do_open_execat+0x221/0x8e0 [ 2542.456848] ? __do_execve_file.isra.33+0x8a4/0x25d0 [ 2542.461940] ? unregister_binfmt+0x2a0/0x2a0 [ 2542.466337] ? check_preemption_disabled+0x48/0x280 [ 2542.471344] ? kasan_check_read+0x11/0x20 [ 2542.475484] ? do_raw_spin_trylock+0x270/0x270 [ 2542.480069] ? key_put+0x33/0x80 [ 2542.483430] __do_execve_file.isra.33+0x176f/0x25d0 [ 2542.488443] ? prepare_bprm_creds+0x120/0x120 [ 2542.492939] ? usercopy_warn+0x110/0x110 [ 2542.496993] ? kmem_cache_alloc+0x58f/0x730 [ 2542.501306] ? check_preemption_disabled+0x48/0x280 [ 2542.506330] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2542.511869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2542.517398] ? strncpy_from_user+0x411/0x5a0 [ 2542.521801] ? digsig_verify+0x1530/0x1530 [ 2542.526022] ? kmem_cache_alloc+0x33a/0x730 [ 2542.530341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2542.535869] __ia32_compat_sys_execveat+0xf3/0x140 [ 2542.540971] do_fast_syscall_32+0x34d/0xfb2 [ 2542.545284] ? do_int80_syscall_32+0x890/0x890 [ 2542.549857] ? entry_SYSENTER_compat+0x68/0x7f [ 2542.554428] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2542.559432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2542.564269] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2542.569101] ? trace_hardirqs_on_caller+0x310/0x310 [ 2542.574103] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2542.579107] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2542.584115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2542.588950] entry_SYSENTER_compat+0x70/0x7f [ 2542.593346] RIP: 0023:0xf7f79a29 [ 2542.596707] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2542.615596] RSP: 002b:00000000f5f540cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2542.623295] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 [ 2542.630639] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2542.637896] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 02:24:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x30, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000000)=r0, 0x4) 02:24:17 executing program 2 (fault-call:6 fault-nth:9): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:17 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 2542.645150] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2542.652408] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2542.791364] FAULT_INJECTION: forcing a failure. [ 2542.791364] name failslab, interval 1, probability 0, space 0, times 0 [ 2542.826662] CPU: 1 PID: 16405 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #266 [ 2542.834082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2542.843447] Call Trace: [ 2542.846045] dump_stack+0x244/0x39d [ 2542.849695] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2542.854902] ? lock_downgrade+0x900/0x900 [ 2542.859066] ? check_preemption_disabled+0x48/0x280 [ 2542.864098] should_fail.cold.4+0xa/0x17 [ 2542.868172] ? rcu_softirq_qs+0x20/0x20 [ 2542.872170] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2542.877291] ? is_bpf_text_address+0xd3/0x170 [ 2542.881792] ? kernel_text_address+0x79/0xf0 [ 2542.886215] ? zap_class+0x640/0x640 [ 2542.889940] ? unwind_get_return_address+0x61/0xa0 [ 2542.894878] ? __save_stack_trace+0x8d/0xf0 [ 2542.899218] ? find_held_lock+0x36/0x1c0 [ 2542.903289] ? __lock_is_held+0xb5/0x140 [ 2542.907377] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 2542.912482] ? perf_trace_sched_process_exec+0x860/0x860 [ 2542.917944] __should_failslab+0x124/0x180 [ 2542.922190] should_failslab+0x9/0x14 [ 2542.926004] kmem_cache_alloc_trace+0x2d7/0x750 [ 2542.930680] ? __might_sleep+0x95/0x190 [ 2542.934663] apparmor_file_alloc_security+0x17b/0xac0 [ 2542.939865] ? apparmor_path_rename+0xcd0/0xcd0 [ 2542.944551] ? rcu_read_lock_sched_held+0x14f/0x180 [ 2542.949759] ? kmem_cache_alloc+0x33a/0x730 [ 2542.954097] security_file_alloc+0x4c/0xa0 [ 2542.958344] __alloc_file+0x12a/0x470 [ 2542.962158] ? file_free_rcu+0xd0/0xd0 [ 2542.966062] ? __lock_acquire+0x62f/0x4c20 [ 2542.970315] ? find_held_lock+0x36/0x1c0 [ 2542.974389] alloc_empty_file+0x72/0x170 [ 2542.978459] path_openat+0x170/0x5150 [ 2542.982269] ? lock_downgrade+0x900/0x900 [ 2542.986427] ? check_preemption_disabled+0x48/0x280 [ 2542.991452] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2542.996385] ? kasan_check_read+0x11/0x20 [ 2543.000539] ? print_usage_bug+0xc0/0xc0 [ 2543.004604] ? print_usage_bug+0xc0/0xc0 [ 2543.008665] ? rcu_softirq_qs+0x20/0x20 [ 2543.012637] ? unwind_dump+0x190/0x190 [ 2543.016534] ? path_lookupat.isra.43+0xc00/0xc00 [ 2543.021298] ? is_bpf_text_address+0xd3/0x170 [ 2543.025801] ? kernel_text_address+0x79/0xf0 [ 2543.030225] ? __lock_acquire+0x62f/0x4c20 [ 2543.034687] ? mark_held_locks+0x130/0x130 [ 2543.038932] ? kasan_kmalloc+0xc7/0xe0 [ 2543.042820] ? kasan_slab_alloc+0x12/0x20 [ 2543.046969] ? kmem_cache_alloc+0x12e/0x730 [ 2543.051292] ? prepare_creds+0xab/0x4d0 [ 2543.055267] ? prepare_exec_creds+0x11/0xf0 [ 2543.059595] ? prepare_bprm_creds+0x70/0x120 [ 2543.064004] ? __do_execve_file.isra.33+0x445/0x25d0 [ 2543.069107] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 2543.074218] ? do_fast_syscall_32+0x34d/0xfb2 [ 2543.078719] ? entry_SYSENTER_compat+0x70/0x7f [ 2543.083310] ? percpu_ref_put_many+0x11c/0x260 [ 2543.087902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2543.093444] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 2543.098904] ? refcount_add_not_zero_checked+0x330/0x330 [ 2543.104362] do_filp_open+0x255/0x380 [ 2543.108167] ? may_open_dev+0x100/0x100 [ 2543.112153] ? zap_class+0x640/0x640 [ 2543.115876] ? zap_class+0x640/0x640 [ 2543.119596] ? apparmor_cred_prepare+0x30c/0x5a0 [ 2543.124360] ? apparmor_task_free+0x1e0/0x1e0 [ 2543.128867] ? find_held_lock+0x36/0x1c0 [ 2543.132939] do_open_execat+0x221/0x8e0 [ 2543.136920] ? __do_execve_file.isra.33+0x8a4/0x25d0 [ 2543.142029] ? unregister_binfmt+0x2a0/0x2a0 [ 2543.146440] ? check_preemption_disabled+0x48/0x280 [ 2543.151470] ? kasan_check_read+0x11/0x20 [ 2543.155625] ? do_raw_spin_trylock+0x270/0x270 [ 2543.160226] ? key_put+0x33/0x80 [ 2543.163607] __do_execve_file.isra.33+0x176f/0x25d0 [ 2543.168637] ? prepare_bprm_creds+0x120/0x120 [ 2543.173137] ? usercopy_warn+0x110/0x110 [ 2543.177908] ? check_preemption_disabled+0x48/0x280 [ 2543.182946] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2543.188492] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2543.194036] ? strncpy_from_user+0x411/0x5a0 [ 2543.198455] ? digsig_verify+0x1530/0x1530 [ 2543.202697] ? kmem_cache_alloc+0x33a/0x730 [ 2543.207025] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2543.211615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2543.217162] __ia32_compat_sys_execveat+0xf3/0x140 [ 2543.222110] do_fast_syscall_32+0x34d/0xfb2 [ 2543.226440] ? do_int80_syscall_32+0x890/0x890 [ 2543.231418] ? entry_SYSENTER_compat+0x68/0x7f [ 2543.236005] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2543.241031] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2543.245876] ? trace_hardirqs_on_caller+0x310/0x310 [ 2543.250898] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2543.255921] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 2543.262587] ? __switch_to_asm+0x40/0x70 [ 2543.266648] ? __switch_to_asm+0x34/0x70 [ 2543.270722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2543.275572] entry_SYSENTER_compat+0x70/0x7f [ 2543.279982] RIP: 0023:0xf7f79a29 [ 2543.283351] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2543.302254] RSP: 002b:00000000f5f540cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2543.309968] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 [ 2543.317238] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2543.324508] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2543.331781] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2543.339047] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 02:24:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:19 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x3, 0x6, 0x4, 0x55, 0x80000001, 0x4, 0x5, 0x4, 0x0, 0x7fffffff, 0x7ff}, 0xb) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:24:19 executing program 1: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) ioprio_set$pid(0x2, r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r4, 0x800000c004500a, &(0x7f0000000040)) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0xffffffffffffffd3, 0x5, 0x100000000000d00}, 0xfffffefd) r5 = dup2(r3, r4) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f00000007c0)={@loopback, @multicast1}, &(0x7f0000000800)=0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r4, 0x641e) readlinkat(r4, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/209, 0xd1) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000080)={0x0, 0x41}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) munmap(&(0x7f0000585000/0x1000)=nil, 0x1000) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000140)=""/4096) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x60) 02:24:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2a, &(0x7f0000000000)=r0, 0x4) 02:24:19 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:19 executing program 2 (fault-call:6 fault-nth:10): r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:19 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000040)="5c8b7bc6321ce194537f4cea414972b7715007b19bfba922fce2a021dcd1ffcae535f1fb553dc3f90b80c18c0356c1a51584539be7808c84bdb41fe9a8d0af686e71e87c90c7a0f7431426faa4ece4f6838cc6ffb14686cc6109353f4d537939b6bde20e600e0ec9c7012976cd879294e39adc8e45b7f4289926ef260383560760fb072164") mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) [ 2544.937091] rpcbind: RPC call returned error 22 02:24:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x9, &(0x7f0000000000)=r0, 0x4) 02:24:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x700000000000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:19 executing program 5: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x2000000000000000) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000400)) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f00000003c0)={0x5, 0x7ff, 0xbb, 0x7ff, 0x8}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0f8565c, &(0x7f0000000480)={0x5, 0x9, 0x5, {0xa, @sliced={0x80000000, [0x8, 0x1, 0x3d65, 0xa0bc, 0xcc, 0x100, 0x4, 0x81, 0x8, 0x8, 0xbe77, 0x213d, 0x76, 0x4, 0x5, 0x2, 0x9, 0x81, 0x7, 0xfffffffffffffff7, 0xf1, 0x1, 0x421cc2ce, 0x80, 0x7fff, 0x0, 0x7fffffff, 0x0, 0x3, 0x3, 0x2, 0x4, 0x0, 0x8, 0xfffffffffffffffe, 0x8385, 0xf4b, 0xc5, 0x5e2, 0xa0, 0xfffffffffffffffb, 0x7, 0x9c, 0x8, 0x5, 0x4, 0xffffffffffffff36, 0x101], 0x1}}}) getpgrp(0xffffffffffffffff) sendmsg$alg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="e942ae4f502a171fe98f7463d42a70dfa9c85a5e1a50f1da8bb12a6358b6badb895cdf2d086b5b79b56d2d3a647d76f7dc62cca54e8d9cb84964004ca609e0d38a15011f6328a8ade6dc0460dcf6f563e087a8e99f44547194048aefc72293599aa00e0ee9ae140a748a3b8794f34be09f879e88b76f824f775ec18fc0b623a976ecd23dd2341a8ec3f3d01cabd0e902ea0951", 0x93}, {&(0x7f0000000180)="d0436610f854a66f1be373e3f579db3c1dc7ffa6c56ef8f299f553de95bbf890f8cda30b055b13ec9fd04119b02c7dabcb4690cb4997b3bd1b1e456cf30cb61088155a158000f78193dc3b5fae1eba54d13f285d96b5ecc2b20fb6e7af33d76304e6b0ccc5d43876f21bf67d73418f212cd42960181211c0592ca8d2627b8a718329c70286709a110acbe12b536deeba24c489ef1ca953de32f052087b3a82aac4cd89d5d80034b289e80f70496ac9a5fa28c955c52871a12e03d5b2f0d2fb682e70814c09a7fbe0d88eb158212b6e32e176710353e5c37476dfae116584f338f230afb6ee1c92e02160a5d310b4c974eccd73", 0xf3}, {&(0x7f0000000280)="e7174dd2c145085aa3d4d1d79f07b5dab306e45bb50453538143ea19dddf030ccb14c807578971143208b871f56176acf4557e14bc86fa774f4b1044b8e5547813843ca781dc15", 0x47}], 0x3, &(0x7f0000000300)=[@op={0x10}, @op={0x10, 0x117, 0x3, 0x1}, @assoc={0x10, 0x117, 0x4, 0xe0}, @op={0x10}], 0x40}, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000100)=0x3f) [ 2545.021424] rpcbind: RPC call returned error 22 [ 2545.024935] cgroup: fork rejected by pids controller in /syz2 02:24:19 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x9ffffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x60) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000005200000227bd7000fbdbdf250a00fb000800f0ff200000000000060005000000"], 0x24}}, 0x5) ioctl$RTC_EPOCH_SET(r0, 0x4004700e, 0x6) 02:24:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xd, &(0x7f0000000000)=r0, 0x4) [ 2545.094888] FAULT_INJECTION: forcing a failure. [ 2545.094888] name failslab, interval 1, probability 0, space 0, times 0 [ 2545.098623] kernel msg: ebtables bug: please report to author: bad policy [ 2545.119639] rpcbind: RPC call returned error 22 [ 2545.157240] kernel msg: ebtables bug: please report to author: bad policy [ 2545.163073] CPU: 1 PID: 16434 Comm: syz-executor2 Not tainted 4.20.0-rc5+ #266 [ 2545.171598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2545.171604] Call Trace: [ 2545.171627] dump_stack+0x244/0x39d [ 2545.171650] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2545.171680] should_fail.cold.4+0xa/0x17 [ 2545.171702] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2545.171721] ? switched_from_fair+0x10/0x10 [ 2545.171747] ? zap_class+0x640/0x640 [ 2545.171762] ? kasan_slab_alloc+0x12/0x20 [ 2545.171775] ? kmem_cache_alloc+0x12e/0x730 [ 2545.171786] ? prepare_creds+0xab/0x4d0 [ 2545.171804] ? prepare_bprm_creds+0x70/0x120 [ 2545.192531] ? __do_execve_file.isra.33+0x445/0x25d0 [ 2545.192546] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 2545.192565] ? find_held_lock+0x36/0x1c0 [ 2545.192583] ? __lock_is_held+0xb5/0x140 [ 2545.222176] ? enable_ptr_key_workfn+0x30/0x30 [ 2545.222192] ? perf_trace_sched_process_exec+0x860/0x860 [ 2545.222207] ? may_open_dev+0x100/0x100 [ 2545.232097] __should_failslab+0x124/0x180 [ 2545.263477] should_failslab+0x9/0x14 [ 2545.267297] __kmalloc_track_caller+0x2d1/0x760 [ 2545.271984] ? pointer+0x900/0x900 [ 2545.275533] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2545.280642] ? kasprintf+0xab/0xe0 [ 2545.284177] kvasprintf+0xb5/0x150 [ 2545.287708] ? bust_spinlocks+0xe0/0xe0 [ 2545.291676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2545.297207] kasprintf+0xab/0xe0 [ 2545.300563] ? kvasprintf_const+0x190/0x190 [ 2545.304872] ? key_put+0x33/0x80 [ 2545.308238] __do_execve_file.isra.33+0xc2c/0x25d0 [ 2545.313183] ? prepare_bprm_creds+0x120/0x120 [ 2545.317876] ? usercopy_warn+0x110/0x110 [ 2545.321933] ? check_preemption_disabled+0x48/0x280 [ 2545.326946] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 2545.332485] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2545.338014] ? strncpy_from_user+0x411/0x5a0 [ 2545.342426] ? digsig_verify+0x1530/0x1530 [ 2545.346645] ? kmem_cache_alloc+0x33a/0x730 [ 2545.350970] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2545.355547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2545.361076] __ia32_compat_sys_execveat+0xf3/0x140 [ 2545.365998] do_fast_syscall_32+0x34d/0xfb2 [ 2545.370313] ? do_int80_syscall_32+0x890/0x890 [ 2545.374888] ? entry_SYSENTER_compat+0x68/0x7f [ 2545.379465] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2545.384479] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2545.389307] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2545.394140] ? trace_hardirqs_on_caller+0x310/0x310 [ 2545.399144] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2545.404149] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2545.409248] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2545.414083] entry_SYSENTER_compat+0x70/0x7f [ 2545.418484] RIP: 0023:0xf7f79a29 [ 2545.421845] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 2545.440744] RSP: 002b:00000000f5f540cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 2545.448441] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000000 02:24:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2545.455699] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2545.462960] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 2545.470216] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2545.477477] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2545.502889] rpcbind: RPC call returned error 22 02:24:20 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000000)={0x91, 0xb3, 0x4}) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x10001, 0x3, [0x0, 0x7fff, 0xa36]}, &(0x7f0000000080)=0xe) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000380)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], 0x4b) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2545.516382] rpcbind: RPC call returned error 22 [ 2545.573487] rpcbind: RPC call returned error 22 02:24:20 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{{}, 0x0, 0x3}, {}], 0x20) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x18082, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x6, 0x10, 0x0, 0x4}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0xfffffffffffeffff, 0x0, 0x4, 0x9, r2}, 0x10) 02:24:20 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:22 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="03000000000000009d000000030000000000000000000000018000001000ffff00000000000000000000000000000500000000000000000000000000000008000000ffffff7f40f0ffff0000000000000000000000000000000000000000d200000003000000000000000000000001000000200a0000000000000000000000000000000000000000000000000000"]) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x21f) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000180)={'nat\x00', 0x4a, "e6c00835ecf000c6e3881e13f5f55ae566964fc1896ea98febba997358b2f9ccd23022d19b183a919dff8500259ab0ce0e3de614282281036d287f1f37aedc7ee4dc45bf4cb10da12350"}, &(0x7f0000000200)=0x6e) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fcntl$setpipe(r0, 0x407, 0x9) 02:24:22 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) getpgrp(0x0) r3 = getpgrp(r2) getpgrp(r3) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f0000000200)="f98b15ce61ed02") accept4(r1, &(0x7f0000000080)=@sco, &(0x7f0000000180)=0x80, 0x80800) 02:24:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x28, &(0x7f0000000000)=r0, 0x4) 02:24:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) execveat(r1, &(0x7f00000000c0)='\x00', 0x0, 0x0, 0x1100) 02:24:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x5000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x15, &(0x7f0000000000)=r0, 0x4) 02:24:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3d, &(0x7f0000000000)=r0, 0x4) 02:24:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3803, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2e, &(0x7f0000000000)=r0, 0x4) 02:24:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2300, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:23 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0', "a3a52f41e6ae9ec4e1d9a950e0b7fcce81fc950088dd6f182f5ee5171c918b70bc2b28240d12b1fa1da8dd271cc4fa9548fb"}, 0x36) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:23 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) getpgid(0xffffffffffffffff) r1 = fcntl$getown(r0, 0x9) getpgrp(r1) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:24:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x12, &(0x7f0000000000)=r0, 0x4) 02:24:23 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x7fffffe, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2548.529442] rpcbind: RPC call returned error 22 [ 2548.548535] rpcbind: RPC call returned error 22 02:24:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000000c0)={0x1f, 0x5d, &(0x7f0000000040)="764cdf14df0b7ae8c90826c33c95eff3b5312a2651882311c655e34e5c23e0097a7dc06dfa384d1c3d5cf7cac4f420defba7889816a3d08a204b31acfc19a5ae0abb232bbedd1f5d11b4710cdbf4fddc21f44e623bb0d4da75c3d93c30"}) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:25 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockname$inet6(r0, &(0x7f00000001c0), &(0x7f00000002c0)=0xfffffffffffffd1c) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r2 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r2, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:25 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x200000) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x1a80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:25 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x338, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000000)=r0, 0x4) 02:24:25 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:24:25 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x2100, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000300)) ioctl$BLKRRPART(r1, 0x125f, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3f, 0x9}, {0x9, 0x4}], r2}, 0x18, 0x2) [ 2551.044277] rpcbind: RPC call returned error 22 02:24:25 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2000000000000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x29, &(0x7f0000000000)=r0, 0x4) [ 2551.159507] kernel msg: ebtables bug: please report to author: bad policy [ 2551.189469] kernel msg: ebtables bug: please report to author: bad policy 02:24:25 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000140)='/dev/input/event#\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000200)={0x4, 0x7, 0x1}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x84800, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000280)={@rand_addr, @loopback, 0x0}, &(0x7f00000002c0)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syzkaller0\x00', r2}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0, 0x19, 0xfffffffffffffffc, {0x0, {}, 0x0, 0x0, r3}}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = gettid() ptrace$getsig(0x4202, r4, 0xfdca, &(0x7f00000001c0)) connect$l2tp(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @local}, 0x2, 0x4, 0x4, 0x1}}, 0x2e) 02:24:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xa, &(0x7f0000000000)=r0, 0x4) [ 2551.217640] rpcbind: RPC call returned error 22 02:24:26 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2551.388417] IPVS: ftp: loaded support on port[0] = 21 02:24:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) memfd_create(&(0x7f0000000040)='\x00', 0x4) write$evdev(r0, &(0x7f0000000080), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2551.758018] IPVS: ftp: loaded support on port[0] = 21 [ 2553.265741] bridge0: port 1(bridge_slave_0) entered blocking state [ 2553.273612] bridge0: port 1(bridge_slave_0) entered disabled state [ 2553.281881] device bridge_slave_0 entered promiscuous mode [ 2553.330097] bridge0: port 1(bridge_slave_0) entered blocking state [ 2553.336657] bridge0: port 1(bridge_slave_0) entered disabled state [ 2553.343640] device bridge_slave_0 entered promiscuous mode [ 2553.352739] bridge0: port 2(bridge_slave_1) entered blocking state [ 2553.359284] bridge0: port 2(bridge_slave_1) entered disabled state [ 2553.367371] device bridge_slave_1 entered promiscuous mode [ 2553.411520] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2553.420530] bridge0: port 2(bridge_slave_1) entered blocking state [ 2553.427014] bridge0: port 2(bridge_slave_1) entered disabled state [ 2553.434384] device bridge_slave_1 entered promiscuous mode [ 2553.455125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2553.491900] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2553.534312] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2553.611286] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2553.690004] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2553.763240] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2553.808061] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2553.941818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2553.948739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2554.021022] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2554.028537] team0: Port device team_slave_0 added [ 2554.075967] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2554.083445] team0: Port device team_slave_1 added [ 2554.140840] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2554.148167] team0: Port device team_slave_0 added [ 2554.156444] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2554.165049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2554.175385] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2554.243585] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2554.251050] team0: Port device team_slave_1 added [ 2554.257583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2554.333951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2554.345704] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2554.353217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2554.364056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2554.413303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2554.424043] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2554.431612] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2554.448176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2554.509120] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2554.520686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2554.532877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2554.601099] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2554.609130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2554.623262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2555.202997] bridge0: port 2(bridge_slave_1) entered blocking state [ 2555.209441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2555.216117] bridge0: port 1(bridge_slave_0) entered blocking state [ 2555.222548] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2555.230534] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2555.302949] bridge0: port 2(bridge_slave_1) entered blocking state [ 2555.309414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2555.316091] bridge0: port 1(bridge_slave_0) entered blocking state [ 2555.322515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2555.330506] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 2555.993614] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2556.003281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2557.628274] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2557.910814] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2557.997473] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2558.202724] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2558.209098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2558.223999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2558.273162] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2558.474899] 8021q: adding VLAN 0 to HW filter on device team0 [ 2558.543408] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2558.549957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2558.559479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2558.824271] 8021q: adding VLAN 0 to HW filter on device team0 02:24:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x3, 0x2) pwritev(r0, &(0x7f0000000840)=[{&(0x7f0000000080)="654e845d8522dfeb9084532e6cc8bcc6b94c1af9150a8f740678c744fa", 0x1d}, {&(0x7f0000000100)="81be3eff70cf6713af4df96a8c0827e81b1725062bc117f2fa5321d9275fff223737ab42b6078b27857109946a915dafb035e6543113d0cd35d3627265a20864ecccf9053fc0847939d214d08bc1a130f392f9373669620b4e6e9bdcd3b5833694bc8847de57cbfadaae590656a3854ab4552103a2cb97adafdec181d75036783b138a159a05f88081186169f456f5a6d64364acc7eeac4cc5174e35ec", 0x9d}, {&(0x7f00000001c0)="86ef80e2c1f70cfe24c5d1f2a7ad62c6a6814fe48128d45d8b34864cfad6d48adc5c168f4fcb9be435cb8907f5365982714ed5c723f74112ba658c1ccfd7c3ed807b880e6759323d60237cdf6fee991ab6cd81b2758f07acbb1a4b9126e1b5195a2c62bb2132b8a2e232c2296c45692811a4f4b9ff97", 0x76}, {&(0x7f00000002c0)="c2ac680fb02901c8345ff66964480e257a8266fee2348e1b3980b73a7ac83f54726262f11fb508841fc826c7e3232277586d03a46fb5ecd28b549a5512e3bd1cb466d305be7d0dfba42be737b8bf659873332f2e490cdb7253be6cc451a812dba2e70bf1ff36bd56a90106c9f06e84c16a21aa5096ca59bc4cf84126141db72c1b4998ecb4eb5cbd5ad40a008620c1d4db1fff4a57c9c3bfbda082a78b49fd2d6517bbbb77c4b47df2e94bcec6552a4363657e73944300bf7b6b617d", 0xbc}, {&(0x7f0000000440)="f7773ef46776a57745acafc8a77596de43c86b162ebcaee6841e8c147247526ebc59ca0f8d1ae7a2e2587e2a35c656a292255198a1283198ff9400df1ccd3800ce4884f111c99e2f7dd18c5e76131436313022aa030fa55252504fd6b718f1fad8814e0dfa200099dda09706da1a6659c3a8a0cf2bade56e549e19dd3057582a9a3f9c6710a30c37ab118bc46abd25930a161ef2db2da6982521ab56a84eaab9b8ba4d5b8f2e6c43131d95747350792d84e536529c4eaee6f33cfd321a99bea45724dc874c", 0xc5}, {&(0x7f0000000540)="25b5513802aa8e568940ebd5598ee5deefb7920b7462926e306fb8f3b4ce8d5d7f47047fda728524ac866c6d5f40c179099ff68c166574050804e43dcfa90c7e144a91056675ff3edd59e1334b5c1c7cbaaa5977b653c25bf591fd580cc13335d605014d0b7e4677348e4b71bcefe08d24313d00520a23e1d618714b6f75b20ef4162350abb8b26ecb58507a286b4b107d5299af56b725cf9bbd4df281c7fc26cedb5eb62fe955511d5561befc933bb6675e530c95e2", 0xb6}, {&(0x7f0000000600)="0f39c7b0e0c7409ab7593a0fe8f93a5d5c6809ad79cc1ddba0ca8a5c8d1ae256b67e2da2042f6fcd841715bbf15dd0343b214b3dc3bc887d94d5d0ef3c8fcd9fe747277151573206bb62c5153ebc35fcc52780f60245cd42794fa74be667ab0bf013f193d79be1831a9ec9c433c82be1639fe7", 0x73}, {&(0x7f0000000680)="ffb13eb3c9d0828560c694925d6d95fe18220aa6bf7c85e9366f29ae34d39903c8ca0d8cb81a842c2b5a27f1cde736b9dad68fb459fdd7159737159148afd584f2f37788a8d8557c73dc4b4a07e981a45e800d7d0bc7a83467443c97e5e0b276728a6078a1cf687daae50a4db7f0cde291bc2d1a4025ed96689707d37caf30ae81455aefd0fe825812abe865eed8e3351d0fe58888d2eb855947c4a7daefe279c6d49b97760848e9c883", 0xaa}, {&(0x7f0000000740)="d24ca849ef68fe409d70c34b137960823d485781bf1c5ace2daceb355182481b6c3d5d9928149bb0ea5696537540b673d557c0acd11f98931c6e695774992c37240239f1decd3eb965707972c12ae2ee1f3970c0022f7047176fec80e52fbe2e15a904bd1d47b2271a49b00945fce62fac1b7cf154203dc1593b", 0x7a}, {&(0x7f00000007c0)="4cb0fb8dcd50297e1c458e62a8dab66b46fc4b5ccd15a891689b29bc8f454607f00846163c33043af7f6621a5e7928fa49b9a948abfbaefe769994713cad3c6b2979668fec318abc1c65df16cea65a04c73d98140d499d3c16a4d1", 0x5b}], 0xa, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:38 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0xffffffc2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:38 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000000)={0x2, 0x6, 0x81, 0x1, 0xd61, 0x8}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:24:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) 02:24:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x4, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:38 executing program 1: socket$inet_smc(0x2b, 0x1, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x1dd8, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7ff, 0x42) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000000c0)=r2) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2564.234791] rpcbind: RPC call returned error 22 02:24:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3f000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xe, &(0x7f0000000000)=r0, 0x4) 02:24:39 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000000)=""/29) [ 2564.405360] sock: process `syz-executor0' is using obsolete setsockopt SO_BSDCOMPAT 02:24:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x19, &(0x7f0000000000)=r0, 0x4) [ 2564.473325] rpcbind: RPC call returned error 22 [ 2564.492172] rpcbind: RPC call returned error 22 02:24:39 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:24:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x20) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:43 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000000)) 02:24:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x21, &(0x7f0000000000)=r0, 0x4) 02:24:43 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x1, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000080)={0x4, 0x4, 0xfffffffffffffffd}, 0xc) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x4001, 0x0) r2 = geteuid() getgroups(0x1, &(0x7f00000000c0)=[0x0]) r4 = getpid() ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000004d80)=0x0) sendmmsg$unix(r1, &(0x7f0000004e00)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000000180)="e75aa2db7101b8648e524d93484ae2034ee95794fae79cfe5a121781a6513b32ca016ec7b46d1b529efef6d24ca1f9054102ebead101b2ef45aabcfedc79799fc605aa2a4f6cd2ff3a1ab61a0fc3363cbf3d898e2ad5e8bc19b07f59c306ddcab99491123d6c398fb813efb383d4b3fac0691c23a25b4550292c8fa61613954bafd65aac19d9718dfe9c55b97c0a16460e987e1719bc9ee5b07cbb0d2b0e5d9e8362412e28311ba2baac919f0acf52e242bff90ebb3811e191cbf7e848180d318ffbac6154e8a5ff8e143f8a58398b1f847c98426e12f4b08bdde400a4e69ecaea29640ff6541d0508c919a394e4fb41dbe3b7521e12ce147be4097033f640c0ce45a825f57dd4e06487bc093862c048760cc483cd38f99b2dab398eb39fa0362ce233b754b4f9f7753e3abc2f81baaca6682fbda8f4fc9c2a8758a6b2965a1bb341de48611de0c6cf5125a4c7e4a03cdc5cf59de08097f850c33dc7e165a68498e21e9209a79555b751fd9b961ffea78eadb4700ee4f5d1a65ce479d4cf065ff7da0fcb2e5e7e700f074cedb7cb84a127a4d437cd0d28d4c9ae70302e40e35377118d2292628081aa7cab8e3ca8cdf49d50a2f434ae7b9c96cf93d8b01db321f37bd189b94c07a8b1440ccc7ef0b559f024f890726fd39dc680b862c342cfdb9d08578de7f736269a72fb58a7b4a8ee51a3d71b7820a5c12d4c5a70e14cac396e2d7a4e88bf763b259ba218b77ec4d0e7512f7262ffe091d4092e96cd0a62c546321d6bcd4f5d8802e04035fde4ec5a8d0b5e3b52b04570f1640ae3363f16bf4675695797ffc8177b89bccfa54e38a0d7c315f72e795684f33650b4f8964087967e38669e98e5254b9e568612c468f56df0771879a6a5f067ced3a4edd151c8a8fd7468de2a3694d09c2f311bcdd44761e2c5e1cce04ec41acc052866316b4ba7d1cf23a4a00d63ee7fc980f3647ca39100a0b7f77a1f993229d56f94197286892f63df616d3e34af868217ad6318748b0f9f74e4fe9d31d441ea23df133c652f4ad1116ae3fcd1391b39356cda89dd741c20714985dde6a3557f266704522b5092d2ff4d94c25f6ebfeb653f332eeff8683b35879aa108071c83eb31c5af53cc94b2835a08ff6ea5149386d05829e642df758b7dc100e965e6e0e41c9baed683f11a558f6fb64e3a0b089fc83281f1a3fdc88869661343fb85faefc5e60e07e67fe80b74035abb0baf3f8916b8deb6935b02059f973412d1842c0925b3fa95d7a1a7cccd739d1b2ea28b0225a77ef831d7ba1d5ddac6601b2843e1c775e98889402b26feada71d163f71cd0d066d47a79c6eafa43c995d262c47aae59ae81486af92a95e8dd0d7eb30c56c8e92c101343d9f72c3573fe591940056e6b4c30f4e9bdacdd2636fad38212ea2ef64b4630903829e1f93b8c580aa4b6775502d00ef013eb2d4ca0787624fe4bbce34f9ef7cf38706aec930592e02979c82f355216acaf1f4828e42534c13e902dbe71e9f78c42525f22ea5c5ef5e7757c99f33c7ef9a6c5c82b3e89a5c603f8798c48900795a0d93753531e39b957ce9eb756bf01f1e4c5148e0a239df9e9db16e89b7f65815f24b0b55942fc43a460c93797e25e8b1c6cf55fd2037f311b92aee110d88a136dcfa7c12e48f7f3986c1423c67c56e9b2f521c25f242ead8f7e92f0016c04b9e385aa055319b5366f469634d8d04c5df020d478a61e4fc7db25a6e4e8f5605fdc80c50047e38a6bed5b23ee05b6afea9a67d9dfaeb0f82c0c51b24bbfc24f2147ca6ae20288a793e4994d45aaf5b34d827263f2cf6a645492b3fccf1f4be018fb9362df3643ab138be78d541bb821ee0d2e974ecfee0dfb01945ff9b67e130093ed6f320c017943737c815184c4dea49d68f09ee00dfe02893e431527ca8e30f0bb6e2609a8bf0db87a68cebf0da934b5a5a273894a0a287fabc1d1a6463585a54d3ebe9e8a9566289cf771ddd838b0b984d530ac43a4358c01664bd60c0045d3c449155e7851ed3f6d5c69de8917abc8b6c6932601e9b87d84ef3c32e0bc3362398b92f69edc8e4c8bdd03e08fc4034aaad5dfa103d4b93f00a214203215fc8e5a2a57c9d33692986d80d69e466f7acc99580ed1facda31c1fb5abcd98c42b9c60458645b0637c5a28d910d4385651d3a7b53563e3ecaea0b579b41a156f7a387cb62d98a1cd38cf411d9b5067a6d933918c4fdcb4f6b76a44d0b9643efc0be529640b3d28f74df0700f9c2abb67d0bd7103962cdf838c3da262cc97b56506ce8f522c1b481892c9008345e536baa21c2df80eae7fddbd49756db85db6dcd1b5208245891c3a23a237daf733bce2e4a4ed6622d3c34bd3f6565b695bd5648b0308b7cf8cfb398bab089b598844f5a71babff87af043e65d5b8f9a4f9e62eb875001a19b16fcb41771c3c35fb44d290f876b785b69488b6696364787356111337fb502f129d57791a08384a067ecd226973ba0c5b49044235375ea1bf2859dd4a646a8647d9fe660f20337c1814728710ce32a4aa745df2fafd28da7ce8e249d77dbd085f192a5be536ea428466736fab0cf55c4bd869986e76360680b0b7836a0891c4235710e4029e32d67004199673bef902bc354503afb2bbbf5e79dcaf9b2863161ed46378257ae80db25b02f779328221968f9cbb56b5cfa281d54fa6358efd3e4249835994d6d979608f94da004c6f522397174bb7f231817546cd86c2041f62244d16cf4077a7d03e2a8a01e40397a7cd7b0dc2b9fe1dc3141675f65289c1f9206e01f6d03e77a8b2a31ae46e27739363bb883aed38edd27c30ca77de373556004bfab15350d54240ac06caa81d2bfc62b6d2e37a70541e4606c4a0f6a2990874ad2633af91913d2ac6c422940107909831827beaee6c765cc447e4b09c51393376f2aa7ec7f1195a30ec3ce4ad4d6e1c33c2595c975b0a84aa52f1c9d554cf2f727af205ef4cc44cf03b842cc20763cef0fa2cf3b839f07f442fb5f6b9453eb32fb1af2c78c39fe7a4dba057506dc6f9fb73142d9f3f022321d53b743f601ad353b86bfc6441100a38be8347b1dec9e34900fdae65904da86c9b8a036457ac7b2ae517bbb79e6c3cdd178b07c5aa4c41b7c94461b3444f85a3315881463fb2efd61dd6c34d340309deb892145a886068fe1b5b6c3df6d55f8f84d004f06d0cbf9ddf2a62c830119f6f157f55446a09295c2fe107aeba3127b52719d36fdcb8f7ac428dec15c9ec634bbde04ce62a381cb312fbeca9469b13598f4922ae2ab8f053730998271467bb2f65406b782207cdcc3d5c1dd330646f6b54243834dc600b63acdc6194d1518941dccc7573d1a01833c4a0396480fbeca6cd75f887485f3dcd56f95d37245214f1cb4074395defb31112ac9c55433078d9eeb32e0468ccd01457585b17e1b368a6918048799babf34cfc16d2226ad1c0c1cc189bd985f210f42d039bd14c1051c2030f490c7703e1c02e84ca7776ece6098cb2a36adbb910b53ffecf49c0f69a98aaba8b1367c6328c81648c92efc5d84974fe210188dab9fc47a02245b76754f469952c74429093c6e9972ca449a5686cf5d77374a69e56301b7058af7ef85ba1b70b1d7b07aa33f56f0c7c09d8edf2e932006a0edf5aa61ea9e33a6441f93e3e3ded70a6318e64888e60427609909885a7338790ce3253b87d80acf315811076360c3154214f26de47275cb5a317684df2c37f1e8c465d3e677431ca91bbc2b0c95176f027d080c03941e7c9bd81266cd68becd5629166a5cb81749d6ead716506d3607b6274f0a27da3efa612766dcb985b559d48cb2e6e4f01f62ef6b7d1fc55e8daa34d44f31b2120cbc5c1bb547187f9c88e4b3a33936f5afd8e175e91b1b9e4131121d5b493c95d8dfe5be4287fc42ee9eb2e3b29eae88dd8dda2fa0e96dcbcbfffdb7c23baf9f615c2836fd3f07e7cf97420cdbb78de955ebb0086828fe7fdad1dc0f8562f848d239cef049b9cfa48515d2df77051dc3249b01ce2bcbb7b466af26f4848b16a16212149a188c31e42dddda2f12c43a2f1287297990fadf50c87e1a9e78e7399852f67244d364780096c1e1d28eb695c334d26921653162e3fa9a95698f9602a541d7855b50541f9ec0f91b9183403c9c1690c2178b08bbd41f40eed205da3f1d964b501ce18d5993f083cdb6de89d8edf38c1079bb83a881ddf274d50fee31e7866871ae35e9f724e7022f28b125a047e57f017e6ad2fc20c33267dfe5b464ffba040ce90388074d7e87bde01ea1bec14657fb1b49ab9f00c98859721782601cab043bf73cbcaaf789635f1ec7040ce85c751d2d531d6ffb7897088128dda0d991cc5a7e6900f329b5888d6e1ad861e43d6e493899d3647755bb913507401c658c53975f52c31a9ac57e3dd294490619c5be898ae95f2583ab7206e46b805dadf9562280005f58578812e800027a9f3f234ae5f8feefd52ad7463b8512e5a65d83d261494ff9526983e78f3fcb7a35364c85f7193f3432f6a9241201d90b2640c47629cb9fe57cf34e2c23140e8db349edc8a3612444ed1ca93397c024c3fc4db94ebe86fe9bafe072c6b7d9a9f566750430842dd9427f0e93e97f3834b4b9bfc4805714e5383abaed195b7e4a416d7b4990eee3ff53f53d5535af0cea467bfdbca87e61f70230545a9e140b59fb72807e9a6fb817011a38a1bd38af50791618a5b990d2756b9d0c845d4babba5fd24fb27242439a859f355ac8a5e9b7566e3ac4222d8bbf95155316089f44d4b5c9f9f367833748c08fe699c235ff0d43e86775edf486c9f147f51aee7fe29cf96ab398aa5f8aa8fede322965226d62fac27179f23a2fb1cd935a3faa26b38a2fa8cbf885a08c1407aeb818aadc13cbe21b9849602010a6701860d4845325c6143b38c8eef0b9c67f36447269ca9cfc47260540600c77c59d4583dd8b052677ba863020226f24b7617eaa7a082f4670ab9ba74d898bd482f9e14008ae7a02787151d04f8697e31ca00c5afadcec6158895f04c799adcf7059e7e6c022ec8e96c2336f8acd213ae5a0840e46ce7423fa8ae3f9e8ef48a4a20e25023ad0e6e9d4f1c1fc97a737faa5718c603eeb3d30601f5e8c53be5b45cca1d21ebc18a8c38a7618b492bf3d76375e96dfdb6f7ab7c634d174fd2e5ebff4f2b71849f9e1fc04192b45dc931b47a338edbf8d236fa8bf3cd3fb7ff329c88b9c2894bab7d33c46c4dfffe0c32bd3021645e915d1df2df3a794351e90e4f3502fa17336557c705dd1fbe156d2ea096fcbf3c4d3db68bfa523c1358fea6ff0191ed6be575a69cc169b87495025580b679bc81dca1911170c1e170a02816bbf1d09ca02910947fbc1a6e2e72d44a3cb09b4ef8a641bb0540e9eb21647785237c999935b861ef0faef0bd34dcc6bfbd2145e76911958e310519210ecbd485420d59581f7d4fda81d196000e7296d1d22e7221db9ebb9091a9e8eb0857defbb1d33df2b7a799a698772ce9ba81d42a15b99c2df28536c2493090674d55c1021357968b3f17ef07bd3b239b44f0f6de676c00e2a58d681a831761b31d0fe6d6690b34145711cd8ce2a07928b856ec136c44d2ad1835d5fa08b93b4ffa3210e4fea69186a5cf1b415b3e2bda1879ca2c82cb3df153a366c558ab3453971ce4b58b3fbb6c10eb252bd05b910d75ae0ee7418eff851ff2379c8ccc7d90c013c8a5409d8faf508c7f0cc9b46b4e9108fa20e80c6cbc2e2ad6e1c12dddc3e2b474d544a3b2115c40eb74076684ad77a05373218b6ffdd", 0x1000}, {&(0x7f0000001180)="baec42151113add9e2c16f5ae1541d1f7e5acbd8c2300f2d6c0c81543ffbff044419c9b4084d71b5429f1bc862266766bc818cef5fff0c15d2d7bd3f3a265665fbc210d2d26241cb1212b481a89f4a40fa", 0x51}, {&(0x7f0000001200)="75ffa37e4a06d6fe76f9c0f213765e96329d3f57118885e6116529bc6a7d233717c97736680b013fa1835d59092f49661fdf44ca07036620488e9b0623", 0x3d}, {&(0x7f0000001240)="6891635f858649fff846cc6c6bdce8b4319fb6fb61bc1f6bf85f34176959a3df8a1604e993fcece8764e3122fb7d418c0c564d09b600b4178c0bb6f7b50e90a7d9edc4675d57201ee30ad9a71ec043dbea08a073955eb0673ff8382ade79e4d8bd95fd3257c4162ee5e89f7777e69a2a80666574284b378dbd34602d1dd188c95f613805e44a5c3777ac6d2e368a78e2e2c5b17bec89164b56d10447ff05c0ab9c359215814b540b52c641", 0xab}, {&(0x7f0000001300)="203e06a6785e4c9c70509bc0444760ebcee31f9ecd3d9d27702b12c1f72d504b4d662a3347f79e209b57f64bf7690f2cd65e7d5c0a5d79f9aaa29ffd1e32d7090bd3bd95b932539beb2db91b1dc7e07cfde50e3c22e625a0c545489cfabf992d317781c5a18595ffeefdf1763647401e159d04400c9c7222ca4ac4cfe0dc49df74d5af89836a7a473d315a9227004c020fcd127a1884ce042a869aea6b578248c28f4afbfb1352c66f8a7ad5bfef5b007de46386aa68a0483ec6a275648db491bf1e498ce156e5527bd73d", 0xcb}, {&(0x7f0000001400)="7c30f671846054da8c1744888de0ae28f9e5ab95ca9bec8d0fbd44513f3f9d39c97d3f61f37267c0fbb255d82e033f215adce2ffd7e482e75fbc6c6acf617e818f2316f7b90bddab77039b4e565f11ff34a200e0f7cc78b0fe0c81527f", 0x5d}, {&(0x7f0000001480)="881c2410973960b4032074db52f54f3b82d9e1deabef124dfd95c10dc90763dbb464f86bd3c9aa8c0a10db255310811889f14ed047500835f8da216de593dcf57aef6ba7762444ec8b6cfd65f6b16849bd9fb5473a43981e25f709dcafed8c4b596c168c9f27bfeb757b86dfb4b7ec303096692fad57", 0x76}, {&(0x7f0000001500)="3424731435f08f8285f42b20ae5a819a9bc668d047422bcc43b5af8319820c24bfb43725d68dcde658704a344e767452d23bf1266fba36dabebd02c8d26a0bda412fd19443d763378a8c84828f0249e42fdb285c19e6bbf90d59296a93e6fd1eac1a94d0662d1d9b3eb49f94d416daab75eb52526fd8f567294d965d1f8006f7ae915883b68d2f", 0x87}], 0x8}, {&(0x7f0000001600)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002700)=[{&(0x7f0000001680)}, {&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000026c0)="b28b1449747d8ca18b2fb3045bfec267c7703ae4f8483a5530d37d88ed6f790612fda2068eb9e9d3dba3f4cd7f00345a86a2c1", 0x33}], 0x3, &(0x7f0000002740)=[@cred={0x18, 0x1, 0x2, r4, r2, r3}], 0x18, 0x8004}, {&(0x7f0000002780)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000003a00)=[{&(0x7f0000002800)="87844bb0fb90a6032c39f24d9a665028ee2a383d862d8071d80172b3d3b1af0df9ab37", 0x23}, {&(0x7f0000002840)="5089d7f83ca780275e27c4c0c93d20e3584e8a3248c4fd972af7fb3b0f118e4a7aefd3f84d81ee71147e03ccbca671ce791fb904f131703a65f171d7e6e59c5f6ccc0df7618cfb2a50c5cc1d5553ace67256ff6a1253d022804f27e7e02ad8e1983641d4cfeba66f5ef6861db5bc6dcd6876d4c139673694832cf2eb11556f3a91c7d10c2293c1ca5e091d701b5a52e19967b8dcae42d82dcff9d83fa8a0045d26cb44ac065b2c773f57a4329d68c5301e14c336e4eb508cc7ec638c07e763830f57d916c36c9591e1c4e518913d7d8bec61ea96ef0a135d076624188b9cf647322def0664fd74fb80642c49111a73e9d6441168be7e119875fc08b3c9fb", 0xfe}, {&(0x7f0000002940)="1d694626125c04656065e663279c5d1cefe649a337d3acf72b0e7fe6efce49e7074b34a2997708ba561de3d3ca3a295ad0650ce36e7ee3be7735eadc098370443998a40012baaa555bd61d6041780c84ecbb54c0aeb9fb4596dfc16572749cd2462f20adba6f1d1a457619756a8ad3a1b019dd356c13d10f65fdd0f70ac393ce356a7f4d385f0e01cc58c62d", 0x8c}, {&(0x7f0000002a00)="436eb358b30b18877e0571065f486e93790484ba33f5b1e83c46ad26e586f17ae1e91353aeb9043ed6dcf8c9d94c4b02bc9b8fac40d80e554493a31da655b797b426fa5b2aa09f471df60d5a951ddf09ba9f664694b272dbcd424b1c60c6f2271aafb6dd75de0387f8236bbb03fbee4e8dcb129069f2d9983a361bb60d7d534d649dde3403eb1ef1657c1e3a4bb69b26a503252761efafa5f2d8f8597e9e92c600d110ce98044bfc2b41da6894cf5be02d8609585a7ed5cf0cada26d28633603e11c3b0b58d4c46ab74f070edc083fc9965ce5f8fb40d617230956a9ff8555ccea5d7878e4ab5299151580852b04b505c274a9675e24dd284f1332b97768d93db2873a5cb1bd72c5ff73a33eaccaaa2157516514e4af36694d4b22c75a0b2fe0ea786e960e03183138642e8d51be688ab123bde33f552962345dfaae854619b378915cc813776c9181377eb5731590485f85331cefeb6afe513b6628b4e8fe7971737c15896de041d4a582f3bd652319f35f5cbd39a15542de9d560924c82c0c635001f67bba7ea1849ec3239d710062a53eb4a2a0987d00b54a95b078c94187888f991532754cb70c17f083f574e5c4f4efd874cb0d00cc61588bec8308b831253eefc7d76b164acc15606b68097cc3204b63621db4d829ca1c356b3679655cb87ca58930ceeccd4332893c98cece3cd436921a115cb30cf033f95450652e0fd528818cd5dd089ca084fd0fc3fad81d774a2c3b6e6c67c821d690047f25d62f0d13a526c39eaa7bff2c0d8839cfa702261a991c517d213377ae7da3f8db91093aca00f24f532638c8312df1b849dae8e9e310a90073856d5edafeab0027a0d3b712dde7280772e903c341c571237c787ef52eaf0a3a561c8881cc687aaee0050207b30a763de02c1ed7672f566fcae9a7f2fc42ce8a0fc23428bc69795508b4899f9ade423fe09af6c2a52acd58d2fc27efd62ec7a4501afa57345149e89b0074abcd4e52ce94f9f0cc148ee8715646fd38cf58b9b1045181e7cb6ee8bc57e061ff80664e3ca63ea6e9578121d1a00a5fdda40778df74dfa53b8b07db2a94cf0ee4042b1f5d58df4dcb9b8e23ab465b96df81db0aabac154942f22673f9fdba3ab355851033d71f1728e46d0cbfee6c8bf30ba16699b6ce8456d50c0e8e9b925f9f927ec8a3173648f834a9a8ade1547de3315f172d7b764bfaeba55a92868c70243fc266723884e10219aa75aa49f7241d26c2965e71bf34268a9cd1a00366f1ed8c3cb3236c8e81b60f1d26e2399129bfeaf2609fa014891985ec766f23427a04ba10ba3a1b91fab3dd2f7f099d6739bdbc89c9ad3d31d65deb5a13ccd2436fa4045f9ba8e524c07c4bf1b66d018f60d06806f0a810739746d63857147eba96fe2e4b13385288f0450a68dfe81ffc1f15a220ffcb3c5b893b99d04a6259289af8f2d67dc59680f796be817cc0ef89bee658cf381f2ab938d9b71f96dcdd6c9a85a6584721f6782aaaae5b2fefbd1e069d157339e95ca23c4c931be6721ca7e9317c3b705366f9000e926edaddcb6fc8f2baa4da7caf0869424c840ed7bcb67cff70073c20ca1cfa4909ae9f33affed79c60ae2ece3b595a710698cf4cd9570aca43e96141da70ec41aec36b78a22a818a09ddbad456e33cfe5a07f9b8ec735b29b23a4586d86945b70a3e3550570d258baebb833fa87a6cf85fde571fdc557917a4e5913c9641f418225c7d8f4550389d530f9af1c56ea68ce4c5a09673049613dbde44d0d52f4afe752ca822fe26ad9341fcd522fb87b0adae83bee89da89cb9f3e460e066331e2e6667291c5e81177027ba7acddf91d72be7086917c064348b35ab9ecd191a864d67a091ed23dba46ade600a4b73785ff518961786d01e1d860464b0e027038b93cdb4ec867c7b858e39f51be4330b348b156e996facd954cd1eda01335bfdd305d1703055325295fdda7bb3e935145fed6f7da89deee9b12d2270e105ed52823fdf1358bdb9654a156baa82180f5ec7c24ebd52070a02ca1308d181d20b9fdb71a702b4da0c69578d89ca68c1fc2363305c65d0bcdcc732654d142ebbc4897c85a2d488a0170172a0da3a4402fccb677fb4f3fc80f6363dc4d9073206804624b5aa0ba8d9289cc380053b7ee4e45e48cfebeb9ccc65792a68a3fb37f1b4f53a8edd2d8c5b50d7665842bd929e123c9009887934fb5fcd251cd0c26360f19f0e221d9e756ba620359c922554af41b0615c85bfb40fa8badad2b5f1995dd464bd6a5ef87f3782ef34bfa7032fed3bb03e2564181746af16747864b6bab2652aa2f30c912e89f86bc0ac9d56fa2bed94d78b24674d0ec1cdd83c56229da96160be0d489f6c65bbf586c7a05b5a3ea72a9f155ac6857465a396c751dbfee9110f6d5a30299b1e77d3f584b8e34d31da74e228f6b6d970918869c894c6ea32ddf76d6ddffc987fbab36492137ce369151ffb831e712162f821cbb58a3c7b1e73e90d1643206c9fab77c146a294dc89eabc457ebca3c3944d83c576bb4ac2564d2a16530e213cf4da8b04d823263be06b20ed996c354d69b0c9ee0a3ed4fa29df0754b36605097a4b986b792b6ab428ce982cf2e8be35e86f3c33107bd6f529de8caed6882ee1b336554d1bcf8a1494e485116bee1ce01cdf1fa828a407e3962059dfa58d8d3475c7c7879c33df839a433c568afb76a9eeed2cf7f5583b24134673e13e2bb65570e96637b69d606e1122c155d6a460253c84d97c8a2b513b814133bd6dca474d01f0ea31cfbc6cc032f5469b82c8c99847f7cba1135eb917a92fae7ab399270c0cc32686444347af20463ce4dcea879987696ce08603f582d1bb975fdb96772fdbc7423736600d548a7d3aab5cd3952777a2758bc9182366e729c62eed80717ecffea4114f40230bbf7ab15b72b9dedd18bc0cf052ed51e2ff69e7a6906ef5d6646a236ac94582d7f6f4468609a76286ffb0885c45805d71346ef24dd6fe91975d8433bd394bf9bbda88275c99c225fa472c60bef117077cc9891f13ef997a7831f34677eae536a5f5d3b163671ec2889443ede4575f963f7539515f732871e2500f22c9891bacea65c3a7d067fee0c5fd2ac439eda836bd4275df2cb4cf2397a82bb998238e5b3f773280592285e18efd1865629686771e255c973aa814f65291b3b8783e6a58e5053e06399f1be635ceda9b63dc66e0f1118004492d7b57ed547cf03381e25d332afb5aadbaa11bec957e5e0989125ff6669aea94db856fb39e4b97f943ad6654415c0bef24a35ae20f57686ca5152b56e9b6e71f3a6f515e98cc209e04ced1baf81f656ac4029057ce8636d9f405c0a04ae0015dc9291302317671cffed95de75bf1b3710a79c126e4e14aaa79840e4f09049e7a6abafe19d5d23139e11852e7e7ea77b98024e7e429fae250b6bfe05f85fd2864c96d283cd42cae660fc113be0e0d654448325d59528d4332446011d5c9f2717e5996e093fb5378df0878bccaa2c7874b1ad1b03f77c7d4e13d2b72f25fd11225e6afba5755c59f01957509116261b321361ebee540beabaed0798e6b2c781f45645570571f341252003dd4f113d3d5dbed8da194712ef87b5fd31edf755db9c77702ef1ddc7fb02dc6f5d291ecad356d5da51eb6ab69ecaa58fdc51083efd6be884bb066a536ddacb0edc54b9d259bc309c108d9c704ada7a2fa51a276907e40013b316b1f10bd6d3902594b1d858b5d315f508ba4a6023be8224045102220a1f17bf8902589f299ea9d90cdcaba5f1133489817d5e1c3832733fb5250cf90072875fa4b4e4c65ab953896d754cb83310c2cf327ec5d89f3e76d32482d015b3b42d9c9bbdd864b7d7e3e1beb5df04e0b417e9127c05c1169f70ff48554c1db76e59549e133bd3fbfc774d068c511357944a8384e9a42a9f6602cb47e4ab4c1274aa7010ef5628734c97c64f42fd3498743441b6e82e36dfffa37fa1767f3ff8aab11254abf2bc71c09ba129612f5b7db4c5990ec3642e246b43d14f7ed83e7dd8153f8af6a64e12b14b1e2ca4e8a2875da6e817e414199ba1291dfd6cba26fc93f61ae5d55b7382f8aff2d7b9dd03d38e21d27c6ea7d1a467f98f9bfe5071a66e3a013efd63ca045e94e7781a21b1144454c5d07e88df698af15f37984b1d99a8085a730e4f680c752f8eef371b63a550ab8cdc9d285255ab156d8e0b756294c5b202f249d5e2c87cd44548e3ae17265b50400ae9c2830c4018c8d24f0fc6bb8c53f9766f9f196f38249f6dc70cc7b5c9bcc7972dc160ef57ea7d45565ed76fee76ce40c7b49a9b8b874eac38cb0f80959a700539b3895cc95da522de6a052a21d23d817c1fac37677b7029ddfef3e1a5b5b519d12940c04477cac7267241b9d8b07b0e5b1d54478bbbd4e7759a0a51dfc3f38386e1512b1a5a31d0e436ecf8dcb4ac5a1b353939af7e783f2aaa17e5d57e1f5208b4e329702a9dfa3d95798b53ad13a04469babe03c5229e56c1b75770c0157bf58c3e6f942ae5efa7178da9990f5b3033dc639a7857461909f1f75e35c885f6e35919e22c1a39a6483eff63b903b24ecd98ff25f5c0aa1f66642b45aacacabd3cba09915a90e8a64b15a8264e1ad9425388ec11a61925a57df500d9f015e576d47bc74bd267d9c47ab00d4a3d29618c8bf41c1a32e147e2821e81f822bdb93d169043d9025ebbd18c4e7ec3be32262ded9e7b5140ab1c6b01d34ac9321ae4a9873d364ba856c3d565eba6524afa53d845a5253d47918e472839d9e5f46c3554a285bcca5a4703c992b1bc7efc4fd4e2e9af64adc2e09984ce28cf512d1e6b9488520528ed2f2feeae6aa2c296e7c2bb54c526a3c51153ff1989033e40ecabe714729e15f1d514a176854f9f6cb04b1c1233aeefbab2578ad849aeeb4081173f444d7814c38654b2c320fe9b4450be6b4266dc12822ef1f3834c128d858b8020f69f3d672f856ca87fe81a997fbbf9b82106ce5826420902c80c39fc7b03fb57db32e267130540bde09b9ea8d25a88e3b63c784c7b514700dfde555de5b9f5fea4de59c72f907f5367f4b357aa25a00312f968c0ad57a7af7f9364da13fe4d1fe0609abb7a098d6b6ac89ed72d3b914448909c6e6047c48ad22da1701f02818199a6847d17c4d6e495ff99b85cc2bd0d194d213851a8f33c84923252096c550ea6630c2dfb781377eed342f1336aafd7b424896ca45d48fddd924c48785c0193d495857b2b8fe87a715b42ebeecbeb06f468ba19c1c6cc8a4b80e72f536043c1fd735ec949fc833bb1b5427b9ffceb32647d8727833bb58f5ceb16c40953a2b72035805c4d20192f990cc7662aa93bd49aa14d413c4223b37a373f9b599527ef446f6652830c21b01a55a5d2fbc6342f244edd6ace592e5abfe7e9d46168417c4cd02e9466b5078f4fdf421e61a808c397a3f44f97d9bfd5c7833a5e1264d2ecbd1c9ab361960de2b527c9a2e4fd40a098dc8240c49faf0b506b928eed02a265b01fec7ed64a0c4f3aef77de99709f1d75b5c0c76e6fa7690327f7cc76060fc39d6d1623970d7a7f8af365e0843f9a329d11c44cd907d3155b399c750c18142714ea7031c36832aee983f49742cc245748f9d2dd0ca9c700b44b31375824109d9cb1330460d5805f4bf80fd36f28432d61521121a9d371516471066f9a0b91638479a66446a32a63ea0fadadbbdc1ef77c46e9457d912f22b8ac3b1842d680404728b73f1640f39a48b9c6ac4b94a14a12e35f2104da870a09b940f6541305886cac539", 0x1000}], 0x4, 0x0, 0x0, 0x8080}, {&(0x7f0000003a40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000004bc0)=[{&(0x7f0000003ac0)="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", 0x1000}, {&(0x7f0000004ac0)="6e09040a784ace11e75ccd6eb5260b533c2700372603b57f09613429ae4def25b9b8d016096852687bf85600cb62148dcaa77da07987d996f94c56b880a6183631b860d5838905f834f029e2368f4a76d9d8ae48a988edb1986f6f24f2cf8eed79de9955e71be4cf78fa5fa4d9fa4624ab5b2b5c8924631b5ef7bd4756ac7af26a8a617fd65a1bfbcaad90976db2311c7d448c6ab881551e91086b32926b1f5dfabd9050fcb39564e41c1906d8a543201a8dc80114680cce6c4d5a1a07e9e718130e4b51017b34f41fec1b4b7937963247e2a7de2c", 0xd5}], 0x2, 0x0, 0x0, 0x20048800}, {&(0x7f0000004c00)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000004d40)=[{&(0x7f0000004c80)="6651710838bbc03bf141a990082e9c20a05d44b998ea5a352605e9c6f02a313de4eeb877b0ab4a23f95212ba0b26f44f96a2a990292e3bccfcf5d5454d714d895e5ef20664f8c3b5c08b603d68ce470d32d7a89df5aed6ec5e039647b385af233dd50e7605f63246d755239ef85aaa7259ce5cd2ca018b2c7749cfa7c4e999d0ae93afbdca7de804eb3e03995a641c4a14189e7df9309c", 0x97}], 0x1, &(0x7f0000004dc0)=[@cred={0x18, 0x1, 0x2, r5, r2, r3}], 0x18, 0x5}], 0x5, 0x20000000) fchownat(r1, &(0x7f0000000080)='./file0\x00', r2, r3, 0x1400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 2568.390591] rpcbind: RPC call returned error 22 [ 2568.409134] rpcbind: RPC call returned error 22 02:24:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2f, &(0x7f0000000000)=r0, 0x4) 02:24:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x600000000000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000e00000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) r2 = request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="00000600", 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r2, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000080)={0x0, 0x2, 'client0\x00', 0x3, "422ebab6b520d35b", "5c269b881755f8c3405f09606ce249396f255d1ed389b883fd098ab24145afa7", 0x100000001, 0x3}) 02:24:43 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000280)="00000600006a00000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0xdc5, 0x80000000, 0x9, 0x1af06bf7, 0x800, 0x5, 0x0, 0x8, 0x100, 0x19c, 0x1}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x8, 0x20, {"a7b9d78a14c7fd45ad02b1ca451e1a20"}, 0x7, 0x8, 0x9}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) 02:24:43 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000000)={0x5, 0xd2, "9056d7f54ccef1a7744490e62f70af60b40e3e946252d243146557845b389ecc6a7a859ade435a9bb26d9938e3308708ad1ecbeca8ce2eae99b62a9dea83844c4160584800e83ecc437714cd9cccbeb19cdbb2de6d91ed85d6c9750afe95650e4c660d4a50abb76281adece0e393c69aced9b4f8238ee2a13001e3d17bf8578b284234c628d0cbd37c8e03f7f22f2bbc099aa6cd74e9e6ffda315400edf45e404cd582e3bf3eba6b972529cb0c4a7550c67958f1f65d76d403d452ed2fcd6e1fc2619d58b1beb60edf47fe16178627a03a1b"}) [ 2568.621487] kernel msg: ebtables bug: please report to author: bad policy 02:24:43 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xfffffffffffffff7, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00000000c0)=0x11, 0x4) getpgrp(r2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/135, 0x87) 02:24:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x8, &(0x7f0000000000)=r0, 0x4) [ 2568.666233] rpcbind: RPC call returned error 22 [ 2568.671997] kernel msg: ebtables bug: please report to author: bad policy 02:24:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x2300000000000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x14, &(0x7f0000000000)=r0, 0x4) 02:24:43 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2568.883332] kernel msg: ebtables bug: please report to author: bad policy [ 2568.920877] kernel msg: ebtables bug: please report to author: bad policy 02:24:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x35, &(0x7f0000000000)=r0, 0x4) 02:24:47 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8a00, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000080)=""/76) 02:24:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x23000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2b, &(0x7f0000000000)=r0, 0x4) 02:24:47 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f4500000000000003003e0000001000000000000000000040000000000000000000000000000000044e82acb7e652ff15000000000000380002020000000000000300000000000000000000000000000000000000000400000000000000008000f8000000000000"], 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000080)=0x7600) 02:24:52 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d200631b0fa1d3000000000000"], 0x14) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:24:52 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setgid(0x0) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x80, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={r2, 0x101, 0x8, "713dcdabf9d0350a173c52d945348e83ef4e9ee83e63a5b9ae613efc4497e1ff8c6039a8341b70642193a2ab92d25cf719d6093ccae85e01cf9e27c97e0a2d421d7515635f33f680955e1af63b4febde3d2d0e6bb6bd8aba9c88a3205e62c3a0fcfe6177db205ae1985c84dcdb2c35b5dbc538f5607cb9afd916e51838c2d3e9d04d52916402e1bcc39cf23576468654a5605e968c00b756198b3616f76c23471b96326d576e88650461bf3ace1dd2781945132fba6c2c041b3416e5443561"}) 02:24:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x30000000, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x22, &(0x7f0000000000)=r0, 0x4) 02:24:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x600, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:24:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x23, &(0x7f0000000000)=r0, 0x4) 02:25:43 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000080)={@mcast2, 0x0}, &(0x7f00000000c0)=0x14) getsockname(r0, &(0x7f0000000180)=@can={0x1d, 0x0}, &(0x7f0000000200)=0x80) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000240)={@loopback, @empty, 0x0}, &(0x7f0000000280)=0xc) accept4(r0, &(0x7f00000002c0)=@hci={0x1f, 0x0}, &(0x7f0000000380)=0x80, 0x80000) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000500)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000600)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001b00)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001c00)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001c40)={0x0, @multicast2, @remote}, &(0x7f0000001c80)=0xc) getsockname$packet(r0, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001d00)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001e00)={'veth0_to_team\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000002400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x84000000}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)=ANY=[@ANYBLOB="48050000", @ANYRES16=r2, @ANYBLOB="00002bbd7000fbdbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="e8010200400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400faffffff08000600", @ANYRES32=r4, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000180000008000600", @ANYRES32=r5, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000200000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400ffff000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004003f00000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000700000008000100", @ANYRES32=r6, @ANYBLOB="f000020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400000800003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006e6fb86966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000500000040000100240001006d6f6465000000000000000000b14361aa00000000000000000000000000000008000300050000001000040062726f61646361737400000008000100", @ANYRES32=r8, @ANYBLOB="7c00020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400ff00000008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400805c020008000100", @ANYRES32=r10, @ANYBLOB="c001020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000400000008000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r11, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400030000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000240004000100093103000000baaa013f050000003f00080500040000010000000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400030000000800070000000000"], 0x548}, 0x1, 0x0, 0x0, 0x40080}, 0x40) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f000000a000)) 02:25:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x25, &(0x7f0000000000)=r0, 0x4) 02:25:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x3, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) 02:25:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x80000, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c46000000d200000000000000f002003e0000001000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000400000000000000008000f800000000000000"], 0x68) clone(0x30000001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:25:43 executing program 1: syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8000, 0x10080) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:25:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) lstat(&(0x7f0000000300)='./file0\x00', 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x60, 0x80, &(0x7f0000000dc0)=@broute={'broute\x00', 0x20, 0x6, 0x310, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x19, 0xc, 0x889b, 'yam0\x00', 'bond_slave_0\x00', 'bond_slave_1\x00', 'ip6tnl0\x00', @remote, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x178, 0x1a0, [@ip6={'ip6\x00', 0x4c, {{@dev={0xfe, 0x80, [], 0x19}, @mcast1, [0x0, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 0x1, 0xc, 0x1, 0x30, 0x4e21, 0x4e22, 0x4e21, 0x4e21}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x1, 0x0, 0x1, 0x0, "ddf9f02881768c3973afaa458fd37c195358599d022ddd2d3396cb45800aab764a99d75940090e37ce48101e41ff295cf848a2e413054245a0fb871c17f71ec8"}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x4, {{0x5}}}]}, @common=@AUDIT={'AUDIT\x00', 0x4, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x17, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bridge\x00', 'bridge_slave_1\x00', 'veth1_to_team\x00', @local, [0xff], @remote, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0x70, 0xe0}}, @common=@NFLOG={'NFLOG\x00', 0x4c, {{0x6, 0x2, 0x1ff, 0x1, 0x0, "a3c1a09d40f251e6548d1f292b2ef1908a947f16986d194602852cdbc890480a2d1128302ac83f6c44c81313c930fb88c11521d0478386b83b661f85b152e5c7"}}}}]}, {0x0, '\x00', 0x4}]}, 0x360) [ 2727.736876] INFO: task syz-executor5:16354 blocked for more than 140 seconds. [ 2727.744352] Not tainted 4.20.0-rc5+ #266 [ 2727.749057] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2727.757040] syz-executor5 D19016 16354 15819 0xa0020006 [ 2727.762656] Call Trace: [ 2727.765237] __schedule+0x8cf/0x21d0 [ 2727.769013] ? __sched_text_start+0x8/0x8 [ 2727.773156] ? print_usage_bug+0xc0/0xc0 [ 2727.777264] ? print_usage_bug+0xc0/0xc0 [ 2727.781318] ? zap_class+0x640/0x640 [ 2727.785021] ? print_usage_bug+0xc0/0xc0 [ 2727.789209] ? __lock_acquire+0x62f/0x4c20 [ 2727.793446] schedule+0xfe/0x460 [ 2727.796856] ? __schedule+0x21d0/0x21d0 [ 2727.800817] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2727.805392] ? trace_hardirqs_on+0xbd/0x310 [ 2727.809754] ? kasan_check_read+0x11/0x20 [ 2727.814079] ? __rwsem_down_write_failed_common+0x9ba/0x15e0 [ 2727.819967] ? trace_hardirqs_off_caller+0x310/0x310 [ 2727.825074] __rwsem_down_write_failed_common+0xc9a/0x15e0 [ 2727.830738] ? rwsem_spin_on_owner+0xa30/0xa30 [ 2727.835307] ? zap_class+0x640/0x640 [ 2727.839054] ? print_usage_bug+0xc0/0xc0 [ 2727.843111] ? mark_held_locks+0x130/0x130 [ 2727.847379] ? find_held_lock+0x36/0x1c0 [ 2727.851436] ? __debug_object_init+0x57d/0x1290 [ 2727.856092] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2727.861274] ? __lock_acquire+0x62f/0x4c20 [ 2727.865499] ? trace_hardirqs_on+0xbd/0x310 [ 2727.869878] ? kasan_check_read+0x11/0x20 [ 2727.874033] ? __debug_object_init+0x57d/0x1290 [ 2727.878745] ? trace_hardirqs_off_caller+0x310/0x310 [ 2727.883837] ? do_raw_spin_trylock+0x270/0x270 [ 2727.888450] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 2727.893417] ? mark_held_locks+0x130/0x130 [ 2727.897711] ? zap_class+0x640/0x640 [ 2727.901415] ? zap_class+0x640/0x640 [ 2727.905117] ? debug_object_activate+0x402/0x600 [ 2727.909915] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2727.915017] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2727.920185] ? lock_acquire+0x1ed/0x520 [ 2727.924200] ? unregister_netdevice_notifier+0xa0/0x530 [ 2727.929609] ? lock_release+0xa00/0xa00 [ 2727.933570] ? perf_trace_sched_process_exec+0x860/0x860 [ 2727.939056] rwsem_down_write_failed+0xe/0x10 [ 2727.943539] ? rwsem_down_write_failed+0xe/0x10 [ 2727.948236] call_rwsem_down_write_failed+0x17/0x30 [ 2727.953250] down_write+0xa5/0x130 [ 2727.956833] ? unregister_netdevice_notifier+0xa0/0x530 [ 2727.962184] ? down_read+0x120/0x120 [ 2727.965881] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2727.970497] ? trace_hardirqs_on+0xbd/0x310 [ 2727.974808] unregister_netdevice_notifier+0xa0/0x530 [ 2727.980140] ? register_netdevice_notifier+0x910/0x910 [ 2727.985403] ? perf_trace_sched_process_exec+0x860/0x860 [ 2727.991031] ? trace_hardirqs_off_caller+0x310/0x310 [ 2727.996198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2728.001878] ? fsnotify+0x50e/0xef0 [ 2728.005526] ? down_write+0x8a/0x130 [ 2728.009309] raw_release+0x58/0x6d0 [ 2728.012933] ? fsnotify+0xef0/0xef0 [ 2728.016652] __sock_release+0xd7/0x250 [ 2728.020530] ? __sock_release+0x250/0x250 [ 2728.024682] sock_close+0x19/0x20 [ 2728.028219] __fput+0x385/0xa30 [ 2728.031492] ? get_max_files+0x20/0x20 [ 2728.035368] ? trace_hardirqs_on+0xbd/0x310 [ 2728.039852] ? trace_hardirqs_off_caller+0x310/0x310 [ 2728.044960] ? perf_trace_sched_process_exec+0x860/0x860 [ 2728.050470] ____fput+0x15/0x20 [ 2728.053743] task_work_run+0x1e8/0x2a0 [ 2728.057662] ? task_work_cancel+0x240/0x240 [ 2728.062033] ? switch_task_namespaces+0xb8/0xd0 [ 2728.066799] do_exit+0x1ad6/0x26d0 [ 2728.070370] ? mm_update_next_owner+0x990/0x990 [ 2728.075040] ? print_usage_bug+0xc0/0xc0 [ 2728.079149] ? zap_class+0x640/0x640 [ 2728.082862] ? find_held_lock+0x36/0x1c0 [ 2728.086983] ? __lock_acquire+0x62f/0x4c20 [ 2728.091210] ? lock_downgrade+0x900/0x900 [ 2728.095354] ? mark_held_locks+0x130/0x130 [ 2728.099635] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2728.104893] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 2728.110052] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2728.115579] ? futex_wait+0x5ec/0xa50 [ 2728.119425] ? futex_wait_setup+0x3e0/0x3e0 [ 2728.123741] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2728.128990] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 2728.134081] ? futex_wake+0x304/0x760 [ 2728.137929] ? zap_class+0x640/0x640 [ 2728.141645] ? memset+0x31/0x40 [ 2728.144912] ? find_held_lock+0x36/0x1c0 [ 2728.149192] ? get_signal+0x95b/0x1980 [ 2728.153077] ? _raw_spin_unlock_irq+0x27/0x80 [ 2728.157628] ? _raw_spin_unlock_irq+0x27/0x80 [ 2728.162125] do_group_exit+0x177/0x440 [ 2728.166178] ? trace_hardirqs_off_caller+0x310/0x310 [ 2728.171355] ? __ia32_sys_exit+0x50/0x50 [ 2728.175462] get_signal+0x8b0/0x1980 [ 2728.179363] ? ptrace_notify+0x130/0x130 [ 2728.183426] ? find_held_lock+0x36/0x1c0 [ 2728.187532] ? __might_fault+0x12b/0x1e0 [ 2728.191579] ? lock_downgrade+0x900/0x900 [ 2728.195712] do_signal+0x9c/0x21c0 [ 2728.199353] ? pvclock_read_flags+0x160/0x160 [ 2728.203843] ? posix_ktime_get_ts+0x15/0x20 [ 2728.208211] ? trace_hardirqs_off_caller+0x310/0x310 [ 2728.213317] ? setup_sigcontext+0x7d0/0x7d0 [ 2728.217707] ? exit_to_usermode_loop+0x8c/0x380 [ 2728.222422] ? exit_to_usermode_loop+0x8c/0x380 [ 2728.227153] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2728.231733] ? trace_hardirqs_on+0xbd/0x310 [ 2728.236041] ? do_fast_syscall_32+0xcd5/0xfb2 [ 2728.240597] ? do_fast_syscall_32+0x150/0xfb2 [ 2728.245156] exit_to_usermode_loop+0x2e5/0x380 [ 2728.249802] ? __bpf_trace_sys_exit+0x30/0x30 [ 2728.254292] do_fast_syscall_32+0xcd5/0xfb2 [ 2728.258659] ? do_int80_syscall_32+0x890/0x890 [ 2728.263238] ? entry_SYSENTER_compat+0x68/0x7f [ 2728.267872] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2728.272877] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2728.277804] ? trace_hardirqs_on_caller+0x310/0x310 [ 2728.282871] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2728.288010] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 2728.294680] ? __switch_to_asm+0x40/0x70 [ 2728.298796] ? __switch_to_asm+0x34/0x70 [ 2728.302851] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2728.307743] entry_SYSENTER_compat+0x70/0x7f [ 2728.312141] RIP: 0023:0xf7fb8a29 [ 2728.315501] Code: Bad RIP value. [ 2728.318903] RSP: 002b:00000000f5fb412c EFLAGS: 00000292 ORIG_RAX: 00000000000000f0 [ 2728.326632] RAX: fffffffffffffe00 RBX: 000000000814af68 RCX: 0000000000000080 [ 2728.334020] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000814af6c [ 2728.341572] RBP: 00000000f5fb4228 R08: 0000000000000000 R09: 0000000000000000 [ 2728.348867] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 2728.356131] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2728.363522] [ 2728.363522] Showing all locks held in the system: [ 2728.370639] 1 lock held by khungtaskd/1019: [ 2728.374990] #0: 00000000dc11fe09 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 2728.384032] 1 lock held by rsyslogd/5865: [ 2728.388263] 2 locks held by getty/5955: [ 2728.392225] #0: 00000000fe747e0c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2728.400543] #1: 000000004ec47fd2 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 2728.409500] 2 locks held by getty/5956: [ 2728.413454] #0: 00000000c83fae52 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2728.421760] #1: 00000000d6704cda (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 2728.430707] 2 locks held by getty/5957: [ 2728.434676] #0: 00000000deaa5449 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2728.442966] #1: 00000000c69e6340 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 2728.451831] 2 locks held by getty/5958: [ 2728.455787] #0: 00000000b2e1a5d7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2728.464083] #1: 00000000be7a9625 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 2728.472970] 2 locks held by getty/5959: [ 2728.476971] #0: 00000000e53fb8cc (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2728.485202] #1: 000000009ca48ba5 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 2728.494123] 2 locks held by getty/5960: [ 2728.498113] #0: 00000000114c9c95 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2728.506593] #1: 00000000f970c78c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 2728.515443] 2 locks held by getty/5961: [ 2728.519484] #0: 000000007672ce73 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2728.527756] #1: 00000000e0a085d8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 2728.536659] 2 locks held by kworker/1:4/18076: [ 2728.541239] #0: 000000000e41d4c5 ((wq_completion)"rcu_gp"){+.+.}, at: process_one_work+0xb43/0x1c40 [ 2728.550559] #1: 00000000fd2da5a9 ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0xb9a/0x1c40 [ 2728.560647] 5 locks held by kworker/u4:6/18683: [ 2728.565296] #0: 0000000060be0203 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0xb43/0x1c40 [ 2728.574910] #1: 00000000adad29fe (net_cleanup_work){+.+.}, at: process_one_work+0xb9a/0x1c40 [ 2728.583624] #2: 00000000c9da9779 (pernet_ops_rwsem){++++}, at: cleanup_net+0x13f/0xb10 [ 2728.591811] #3: 0000000006bbf7e6 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2728.599238] #4: 0000000074a981f3 (rcu_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited.constprop.58+0x7c7/0x9d0 [ 2728.610161] 2 locks held by syz-executor5/16354: [ 2728.614909] #0: 000000009a336b56 (&sb->s_type->i_mutex_key#11){+.+.}, at: __sock_release+0x8b/0x250 [ 2728.625066] #1: 00000000c9da9779 (pernet_ops_rwsem){++++}, at: unregister_netdevice_notifier+0xa0/0x530 [ 2728.634767] 1 lock held by syz-executor5/17378: [ 2728.639469] #0: 00000000c9da9779 (pernet_ops_rwsem){++++}, at: copy_net_ns+0x28c/0x4a0 [ 2728.647695] 1 lock held by syz-executor4/17380: [ 2728.652358] #0: 00000000c9da9779 (pernet_ops_rwsem){++++}, at: copy_net_ns+0x28c/0x4a0 [ 2728.660653] [ 2728.662276] ============================================= [ 2728.662276] [ 2728.669362] NMI backtrace for cpu 0 [ 2728.672987] CPU: 0 PID: 1019 Comm: khungtaskd Not tainted 4.20.0-rc5+ #266 [ 2728.680002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2728.689693] Call Trace: [ 2728.692284] dump_stack+0x244/0x39d [ 2728.695960] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2728.701145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2728.706679] nmi_cpu_backtrace.cold.2+0x5c/0xa1 [ 2728.711412] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 2728.716607] nmi_trigger_cpumask_backtrace+0x1e8/0x22a [ 2728.722128] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2728.727305] watchdog+0xb51/0x1060 [ 2728.730837] ? hungtask_pm_notify+0xb0/0xb0 [ 2728.735151] ? __kthread_parkme+0xce/0x1a0 [ 2728.739386] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2728.744478] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2728.749570] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2728.754151] ? trace_hardirqs_on+0xbd/0x310 [ 2728.758462] ? kasan_check_read+0x11/0x20 [ 2728.762597] ? __kthread_parkme+0xce/0x1a0 [ 2728.766818] ? trace_hardirqs_off_caller+0x310/0x310 [ 2728.771910] ? trace_hardirqs_off_caller+0x310/0x310 [ 2728.777165] ? lockdep_init_map+0x9/0x10 [ 2728.781221] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 2728.786313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2728.791836] ? __kthread_parkme+0xfb/0x1a0 [ 2728.796134] ? hungtask_pm_notify+0xb0/0xb0 [ 2728.800453] kthread+0x35a/0x440 [ 2728.803808] ? kthread_stop+0x900/0x900 [ 2728.807769] ret_from_fork+0x3a/0x50 [ 2728.811583] Sending NMI from CPU 0 to CPUs 1: [ 2728.816146] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x6/0x10 [ 2728.817086] Kernel panic - not syncing: hung_task: blocked tasks [ 2728.829862] CPU: 0 PID: 1019 Comm: khungtaskd Not tainted 4.20.0-rc5+ #266 [ 2728.836869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2728.846206] Call Trace: [ 2728.848786] dump_stack+0x244/0x39d [ 2728.852401] ? dump_stack_print_info.cold.1+0x20/0x20 [ 2728.857580] panic+0x2ad/0x55c [ 2728.860763] ? add_taint.cold.5+0x16/0x16 [ 2728.864901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2728.870507] ? nmi_trigger_cpumask_backtrace+0x1d1/0x22a [ 2728.875951] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 2728.881390] watchdog+0xb62/0x1060 [ 2728.884993] ? hungtask_pm_notify+0xb0/0xb0 [ 2728.889581] ? __kthread_parkme+0xce/0x1a0 [ 2728.893813] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2728.899014] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2728.904101] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 2728.908670] ? trace_hardirqs_on+0xbd/0x310 [ 2728.912983] ? kasan_check_read+0x11/0x20 [ 2728.917119] ? __kthread_parkme+0xce/0x1a0 [ 2728.921337] ? trace_hardirqs_off_caller+0x310/0x310 [ 2728.926423] ? trace_hardirqs_off_caller+0x310/0x310 [ 2728.931510] ? lockdep_init_map+0x9/0x10 [ 2728.935689] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 2728.940784] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2728.946308] ? __kthread_parkme+0xfb/0x1a0 [ 2728.950539] ? hungtask_pm_notify+0xb0/0xb0 [ 2728.954848] kthread+0x35a/0x440 [ 2728.958197] ? kthread_stop+0x900/0x900 [ 2728.962159] ret_from_fork+0x3a/0x50 [ 2728.967348] Kernel Offset: disabled [ 2728.970978] Rebooting in 86400 seconds..