7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:01 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000380)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) lookup_dcookie(0x10001, &(0x7f0000000e40)=""/4096, 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000540)) clock_gettime(0x0, &(0x7f0000000580)) write$sndseq(r1, &(0x7f00000005c0), 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) rt_sigsuspend(&(0x7f0000000500)={0x2}, 0x8) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='bpf\x00', 0x20000, &(0x7f0000000440)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303031302c6d6f64653d30303030303030303030303030303030303030303030372c6d6f64653d30303030303010303030303030303030303030303030332c6d6f64653d3030303030300f303030303030303030303031303030302c66756e633d4250524d5f434845434b2c70f8e33b589478627072656374696f2c736d61636b66736465663d53454736002c00"]) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x204}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="01040000", @ANYRES16=r2, @ANYBLOB="000127bd7000fddbdf25030000001400010000000000000000000000ffffffffffff14000400010000000800000400000000000000ff08000300ffffff7f"], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x1000) 06:01:01 executing program 2: 06:01:01 executing program 4: 06:01:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x339, @sync=0x0}}) 06:01:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:01 executing program 2: 06:01:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x600, @sync=0x0}}) 06:01:01 executing program 4: 06:01:01 executing program 2: 06:01:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xf01, @sync=0x0}}) [ 1193.774500] device bridge_slave_1 left promiscuous mode [ 1193.780018] bridge0: port 2(bridge_slave_1) entered disabled state 06:01:01 executing program 4: 06:01:01 executing program 2: 06:01:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:01 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x1300, @sync=0x0}}) 06:01:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:01 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000200)) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$setregset(0x4205, r0, 0x200, &(0x7f00000000c0)={&(0x7f0000000000)="f5cc1eeb64b81a50b7aacf6c42ebb606", 0x10}) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f0000000280)={0x4275e0578f160011, 0x70, 0x6, 0x9, 0x3, 0x91b, 0x0, 0x7fff, 0x8100, 0x0, 0x4, 0x1ff, 0x2, 0x2, 0x6, 0x3db, 0x800, 0x695, 0x7ff, 0x4, 0x0, 0x80000001, 0xfffffffffffff800, 0x1f, 0x8000, 0x3, 0x80, 0x3b, 0x7, 0x80000001, 0x100000000, 0x3, 0x99ab, 0x3, 0x8000, 0x10001, 0x8b6, 0x0, 0x0, 0x120000, 0xc, @perf_bp={&(0x7f0000000140), 0x3}, 0x20, 0x1ff, 0xfffffffffffffff9, 0x9, 0x6, 0x1, 0x6c00000000000000}, r0, 0x7, r1, 0x1) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1193.834360] device bridge_slave_0 left promiscuous mode [ 1193.839984] bridge0: port 1(bridge_slave_0) entered disabled state 06:01:02 executing program 2: 06:01:02 executing program 4: 06:01:02 executing program 2: 06:01:02 executing program 4: [ 1194.129511] device hsr_slave_1 left promiscuous mode 06:01:02 executing program 2: [ 1194.179813] device hsr_slave_0 left promiscuous mode 06:01:02 executing program 4: [ 1194.230726] team0 (unregistering): Port device team_slave_1 removed [ 1194.278555] team0 (unregistering): Port device team_slave_0 removed 06:01:02 executing program 4: [ 1194.330852] bond0 (unregistering): Releasing backup interface bond_slave_1 06:01:02 executing program 2: [ 1194.421740] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1194.631202] bond0 (unregistering): Released all slaves [ 1196.083202] IPVS: ftp: loaded support on port[0] = 21 [ 1196.166544] chnl_net:caif_netlink_parms(): no params data found [ 1196.202293] bridge0: port 1(bridge_slave_0) entered blocking state [ 1196.209166] bridge0: port 1(bridge_slave_0) entered disabled state [ 1196.218017] device bridge_slave_0 entered promiscuous mode [ 1196.225430] bridge0: port 2(bridge_slave_1) entered blocking state [ 1196.232093] bridge0: port 2(bridge_slave_1) entered disabled state [ 1196.241065] device bridge_slave_1 entered promiscuous mode [ 1196.258838] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1196.268997] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1196.287108] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1196.295019] team0: Port device team_slave_0 added [ 1196.300971] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1196.309603] team0: Port device team_slave_1 added [ 1196.315748] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1196.324022] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1196.385770] device hsr_slave_0 entered promiscuous mode [ 1196.423738] device hsr_slave_1 entered promiscuous mode [ 1196.463995] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1196.471072] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1196.486877] bridge0: port 2(bridge_slave_1) entered blocking state [ 1196.493454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1196.500480] bridge0: port 1(bridge_slave_0) entered blocking state [ 1196.507069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1196.542808] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1196.550041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1196.560151] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1196.570702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1196.578805] bridge0: port 1(bridge_slave_0) entered disabled state [ 1196.585859] bridge0: port 2(bridge_slave_1) entered disabled state [ 1196.593524] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1196.604024] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1196.610124] 8021q: adding VLAN 0 to HW filter on device team0 [ 1196.623521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1196.631977] bridge0: port 1(bridge_slave_0) entered blocking state [ 1196.638482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1196.655778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1196.664151] bridge0: port 2(bridge_slave_1) entered blocking state [ 1196.670636] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1196.688476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1196.697096] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1196.705264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1196.715111] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1196.722356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1196.735886] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1196.742006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1196.759723] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1196.771753] 8021q: adding VLAN 0 to HW filter on device batadv0 06:01:05 executing program 2: 06:01:05 executing program 4: 06:01:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x0, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x1801, @sync=0x0}}) 06:01:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:05 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1196.886195] EXT4-fs (sda1): re-mounted. Opts: 06:01:05 executing program 2: 06:01:05 executing program 4: 06:01:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x2403, @sync=0x0}}) 06:01:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x0, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:05 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40604, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xc, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:05 executing program 4: 06:01:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x3603, @sync=0x0}}) 06:01:05 executing program 2: 06:01:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x0, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:05 executing program 4: 06:01:05 executing program 2: 06:01:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x3903, @sync=0x0}}) 06:01:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:05 executing program 4: 06:01:05 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r3, 0x10f, 0x83, &(0x7f00000001c0), &(0x7f0000000380)=0x4) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)) r4 = syz_open_pts(r2, 0x0) dup3(r4, r1, 0x0) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000280)={0x2, @output={0x1000, 0x3, {0x8, 0x200}, 0x0, 0x5}}) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000140)={&(0x7f0000ff4000/0xb000)=nil, 0x80000001, 0x3, 0x8, &(0x7f0000ffc000/0x3000)=nil, 0x7fffffff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f00000003c0), &(0x7f0000000400)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:05 executing program 2: 06:01:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x3f00, @sync=0x0}}) 06:01:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x0, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:05 executing program 4: [ 1197.734726] device bridge_slave_1 left promiscuous mode [ 1197.740476] bridge0: port 2(bridge_slave_1) entered disabled state 06:01:05 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000014c0)={0x4, 0x2, 0x95}) readv(r0, &(0x7f0000000240)=[{&(0x7f00000013c0)=""/135}, {&(0x7f0000001480)=""/25}, {&(0x7f00000003c0)=""/4096, 0x8}], 0x20000000000002ca) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 06:01:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x4000, @sync=0x0}}) 06:01:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, 0x0, r1) open(&(0x7f0000000000)='./file0/file1\x00', 0x0, 0x0) [ 1197.838005] device bridge_slave_0 left promiscuous mode [ 1197.844051] bridge0: port 1(bridge_slave_0) entered disabled state 06:01:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') dup2(r3, r4) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r1}, {r2}, {r4}, {r5}, {r6}, {r0}], 0x6, 0x0, 0x0, 0x0) 06:01:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x1, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x0) [ 1198.130028] device hsr_slave_1 left promiscuous mode [ 1198.179539] device hsr_slave_0 left promiscuous mode [ 1198.248289] team0 (unregistering): Port device team_slave_1 removed [ 1198.293850] team0 (unregistering): Port device team_slave_0 removed [ 1198.331887] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1198.379459] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1198.560054] bond0 (unregistering): Released all slaves [ 1199.792176] IPVS: ftp: loaded support on port[0] = 21 [ 1199.870029] chnl_net:caif_netlink_parms(): no params data found [ 1199.902836] bridge0: port 1(bridge_slave_0) entered blocking state [ 1199.909651] bridge0: port 1(bridge_slave_0) entered disabled state [ 1199.917455] device bridge_slave_0 entered promiscuous mode [ 1199.925266] bridge0: port 2(bridge_slave_1) entered blocking state [ 1199.932154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1199.939593] device bridge_slave_1 entered promiscuous mode [ 1199.958756] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1199.968115] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1199.985842] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1199.993791] team0: Port device team_slave_0 added [ 1200.000607] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1200.008871] team0: Port device team_slave_1 added [ 1200.015120] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1200.022758] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1200.095580] device hsr_slave_0 entered promiscuous mode [ 1200.163739] device hsr_slave_1 entered promiscuous mode [ 1200.214035] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1200.221358] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1200.237117] bridge0: port 2(bridge_slave_1) entered blocking state [ 1200.243747] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1200.250643] bridge0: port 1(bridge_slave_0) entered blocking state [ 1200.257358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1200.295641] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1200.302265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1200.311920] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1200.321334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1200.329710] bridge0: port 1(bridge_slave_0) entered disabled state [ 1200.337303] bridge0: port 2(bridge_slave_1) entered disabled state [ 1200.345198] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1200.356841] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1200.363726] 8021q: adding VLAN 0 to HW filter on device team0 [ 1200.374625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1200.382691] bridge0: port 1(bridge_slave_0) entered blocking state [ 1200.390039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1200.401189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1200.409834] bridge0: port 2(bridge_slave_1) entered blocking state [ 1200.416515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1200.434752] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1200.442588] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1200.460451] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1200.471039] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1200.482827] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1200.490406] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1200.502019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1200.510016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1200.523135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1200.535400] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1200.550469] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1200.650206] EXT4-fs (sda1): re-mounted. Opts: 06:01:08 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:08 executing program 2: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) pread64(r0, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) 06:01:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2c00000000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:08 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') socket(0x5, 0x0, 0x100000001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x0, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x1000000, @sync=0x0}}) 06:01:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x2000000, @sync=0x0}}) 06:01:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x0, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:08 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xc000000000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1200.897013] EXT4-fs (sda1): re-mounted. Opts: 06:01:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x3000000, @sync=0x0}}) 06:01:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x10, 0x29, 0x39}], 0x10}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:09 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x3603000000000000, 0x0, @sync=0x0}}) 06:01:09 executing program 4: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x4000000, @sync=0x0}}) 06:01:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf5ffffff00000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x10, 0x29, 0x39}], 0x10}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x4, 0x401) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000300)={0x5, 0x1, 0x1, 0x3, 0x9}) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0xd9f}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f00000002c0)={0x7fffffff, r2, 0x0, 0x3}) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:09 executing program 4: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x6000000, @sync=0x0}}) 06:01:09 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140)=0x8, 0x4) [ 1201.805073] EXT4-fs (sda1): re-mounted. Opts: 06:01:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x10, 0x29, 0x39}], 0x10}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1201.875322] device bridge_slave_1 left promiscuous mode [ 1201.880847] bridge0: port 2(bridge_slave_1) entered disabled state 06:01:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xf010000, @sync=0x0}}) [ 1201.970535] device bridge_slave_0 left promiscuous mode [ 1201.979146] bridge0: port 1(bridge_slave_0) entered disabled state [ 1202.198806] device hsr_slave_1 left promiscuous mode [ 1202.251605] device hsr_slave_0 left promiscuous mode [ 1202.310608] team0 (unregistering): Port device team_slave_1 removed [ 1202.342267] team0 (unregistering): Port device team_slave_0 removed [ 1202.382216] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1202.449061] bond0 (unregistering): Releasing backup interface bond_slave_0 06:01:10 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00\x00\x00\x00\xfd\xfd', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:10 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20830224}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="ec0000000308000029bd7000fbdbdf25d7000008a78fc5289ca2e26560f35da42efe826455446fc4fa8de750ccea2ab9f977449f37b7e06489f8a18a7c2e4af6d9706879e28fa100f9765c5d92e916539654558a275f716cce706513b0081dbc0baf033e88739a6b615407fcd145ba90b59bf32c08f9122c3b9c315d384164275717234209d3ce6931b33de0a14d690d22a9b9387e3953a41806e61f1e1f2c1eed560248ed7549e55ebed218b71fbb7cf9df8fcb7cf42c30c108110fa1b6b55719e39fdb62eed2d7d3047782e6c44495a30ea3e6e6959964325284bc9f73ea08002c00ac14140c0000000000"], 0xec}, 0x1, 0x0, 0x0, 0x20040000}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x7, 0x1, 0x8000}, 0x4) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x5, 0x1e, 0x8, "d711b134ec007d49df1114b514d4db7a3a82874543eda596f6b51a53d0e6fb94a1750e46ad782b99cb28366437fcc31d076bb396c03070483c171264bc925d27", "734bef18be30bdccbe5b1473e054dfa47ea611210845d9f52ed3d6d0178210e8fe54ff93d2270924025544eead5f24e6989f7ec938ac9f20b44f416156c56039", "5a5585bd3a3e4f4492a5d8fff89d9a697e2f37ea4e24fb0bb9b4fef820056aa7", [0x9, 0x6]}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, 0x23, 0x200, 0x70bd29, 0x25dfdbfc, {0x17}}, 0x14}, 0x1, 0x0, 0x0, 0x4004000}, 0x40000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x2}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1202.646633] bond0 (unregistering): Released all slaves 06:01:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x39, "27020201594a87ccfe"}], 0x20}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:10 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00\x00\x00\x00\xfd\xfd', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1203.398634] IPVS: ftp: loaded support on port[0] = 21 [ 1203.574996] chnl_net:caif_netlink_parms(): no params data found [ 1203.644013] bridge0: port 1(bridge_slave_0) entered blocking state [ 1203.650537] bridge0: port 1(bridge_slave_0) entered disabled state [ 1203.664332] device bridge_slave_0 entered promiscuous mode [ 1203.672021] bridge0: port 2(bridge_slave_1) entered blocking state [ 1203.695505] bridge0: port 2(bridge_slave_1) entered disabled state [ 1203.707751] device bridge_slave_1 entered promiscuous mode [ 1203.742046] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1203.751904] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1203.781064] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1203.791878] team0: Port device team_slave_0 added [ 1203.804362] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1203.812622] team0: Port device team_slave_1 added [ 1203.829530] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1203.840056] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1203.906180] device hsr_slave_0 entered promiscuous mode [ 1203.963770] device hsr_slave_1 entered promiscuous mode [ 1204.011760] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1204.019217] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1204.055272] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1204.092116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1204.101214] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1204.111106] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1204.117827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1204.132079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1204.143800] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1204.149933] 8021q: adding VLAN 0 to HW filter on device team0 [ 1204.160340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1204.167909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1204.176557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1204.185027] bridge0: port 1(bridge_slave_0) entered blocking state [ 1204.191586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1204.201123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1204.213675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1204.221063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1204.244631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1204.252353] bridge0: port 2(bridge_slave_1) entered blocking state [ 1204.258786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1204.285976] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1204.293801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1204.311414] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1204.320937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1204.337134] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1204.345965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1204.354670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1204.368768] IPVS: ftp: loaded support on port[0] = 21 [ 1204.377031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1204.385075] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1204.392493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1204.405733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1204.416730] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1204.436267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1204.444594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1204.458334] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1204.472621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1204.480308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1204.491837] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1204.497993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1204.525558] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1204.578427] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1204.608175] chnl_net:caif_netlink_parms(): no params data found [ 1204.668945] bridge0: port 1(bridge_slave_0) entered blocking state [ 1204.675836] bridge0: port 1(bridge_slave_0) entered disabled state [ 1204.683557] device bridge_slave_0 entered promiscuous mode [ 1204.692287] bridge0: port 2(bridge_slave_1) entered blocking state [ 1204.699041] bridge0: port 2(bridge_slave_1) entered disabled state [ 1204.706966] device bridge_slave_1 entered promiscuous mode [ 1204.732700] EXT4-fs (sda1): re-mounted. Opts: [ 1204.751342] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1204.760946] bond0: Enslaving bond_slave_1 as an active interface with an up link 06:01:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x39, "27020201594a87ccfe"}], 0x20}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:12 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:12 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00\x00\x00\x00\xfd\xfd', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1204.799119] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1204.808652] team0: Port device team_slave_0 added [ 1204.815218] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1204.826732] team0: Port device team_slave_1 added [ 1204.836949] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1204.863096] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1204.976204] device hsr_slave_0 entered promiscuous mode [ 1205.013861] device hsr_slave_1 entered promiscuous mode [ 1205.044054] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1205.051158] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1205.111590] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1205.272426] device bridge_slave_1 left promiscuous mode [ 1205.278412] bridge0: port 2(bridge_slave_1) entered disabled state [ 1205.344428] device bridge_slave_0 left promiscuous mode [ 1205.351831] bridge0: port 1(bridge_slave_0) entered disabled state [ 1205.586965] device hsr_slave_1 left promiscuous mode [ 1205.649658] device hsr_slave_0 left promiscuous mode [ 1205.713206] team0 (unregistering): Port device team_slave_1 removed [ 1205.762638] team0 (unregistering): Port device team_slave_0 removed [ 1205.794117] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1205.838750] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1205.937102] bond0 (unregistering): Released all slaves [ 1205.980987] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1206.000605] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1206.010413] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1206.016886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1206.024269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1206.034435] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1206.040619] 8021q: adding VLAN 0 to HW filter on device team0 [ 1206.050458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1206.057867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1206.066028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1206.074479] bridge0: port 1(bridge_slave_0) entered blocking state [ 1206.080965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1206.091347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1206.100354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1206.108418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1206.116653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1206.125367] bridge0: port 2(bridge_slave_1) entered blocking state [ 1206.131838] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1206.143066] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1206.153547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1206.166109] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1206.174207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1206.185326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1206.192221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1206.200563] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1206.208759] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1206.219969] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1206.228153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1206.236270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1206.247066] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1206.255202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1206.262897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1206.305652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1206.319775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1206.328224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1206.344467] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1206.350574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1206.372977] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1206.391277] 8021q: adding VLAN 0 to HW filter on device batadv0 06:01:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6c00, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x13000000, @sync=0x0}}) 06:01:14 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x1800b2, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x39, "27020201594a87ccfe"}], 0x20}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x18010000, @sync=0x0}}) 06:01:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x39, "27020201594a87ccfe80000000"}], 0x20}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1206.969884] EXT4-fs (sda1): re-mounted. Opts: 06:01:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x24030000, @sync=0x0}}) 06:01:15 executing program 4 (fault-call:39 fault-nth:0): r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000000001000600000000000000010000800000000044640000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000007f000200000000002360e5fb7e6ad816f4f88eab684ba66cdd0df38905a42b8c9963d479f2fe7f088827a4da7d0ffaec1dd9d103291ae12272fdbcdb30bdf89feb65c045908e04a70000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffffffff0000000042f60000000000003464000000d6a08337eaf89b279aeef9d5637248b2a2bd6ace698815c1e1d62d88edcb7c0197dff80b41b43470c07947d6aaf3fdb0aceb338a0852dbb01101fa65e7af2988fdb9f5e13faed63a5502a7488da102e3db8f2e46b6cdf40e0bccf5fc0663661cc18f75baff5c400896ada2c5034c24258f277a62bbb0ba0bb8dd0bc6e4ae20ef"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x39, "27020201594a87ccfe80000000"}], 0x20}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:15 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1207.410290] IPVS: ftp: loaded support on port[0] = 21 [ 1207.699843] chnl_net:caif_netlink_parms(): no params data found [ 1207.817507] bridge0: port 1(bridge_slave_0) entered blocking state [ 1207.848983] bridge0: port 1(bridge_slave_0) entered disabled state [ 1207.868513] device bridge_slave_0 entered promiscuous mode [ 1207.898101] bridge0: port 2(bridge_slave_1) entered blocking state [ 1207.935419] bridge0: port 2(bridge_slave_1) entered disabled state [ 1207.968153] device bridge_slave_1 entered promiscuous mode [ 1208.028097] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1208.065931] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1208.146180] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1208.184960] team0: Port device team_slave_0 added [ 1208.190849] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1208.198834] team0: Port device team_slave_1 added [ 1208.206343] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1208.218672] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1208.306411] device hsr_slave_0 entered promiscuous mode [ 1208.343812] device hsr_slave_1 entered promiscuous mode [ 1208.405239] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1208.412232] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1208.428715] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1208.462325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1208.471592] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1208.480730] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1208.487791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1208.495907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1208.507900] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1208.514326] 8021q: adding VLAN 0 to HW filter on device team0 [ 1208.524310] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1208.531667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1208.542711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1208.551571] bridge0: port 1(bridge_slave_0) entered blocking state [ 1208.558033] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1208.568765] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1208.577939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1208.586744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1208.595123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1208.604317] bridge0: port 2(bridge_slave_1) entered blocking state [ 1208.610834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1208.620392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1208.627909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1208.638796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1208.647317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1208.666516] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1208.673731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1208.681834] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1208.692536] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1208.700062] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1208.707829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1208.716013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1208.731469] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1208.741953] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1208.753218] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1208.763971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1208.771792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1208.780150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1208.793573] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1208.804817] 8021q: adding VLAN 0 to HW filter on device batadv0 06:01:16 executing program 2 (fault-call:12 fault-nth:0): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:16 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x36030000, @sync=0x0}}) 06:01:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x39, "27020201594a87ccfe80000000"}], 0x20}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:16 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={r2}, 0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r2}, 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r2, 0x0, 0x5, [0x5d3, 0x1, 0x0, 0x8, 0x2]}, &(0x7f00000001c0)=0x12) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)) r5 = syz_open_pts(r4, 0x0) r6 = dup3(r5, r3, 0x0) ioctl$VIDIOC_S_PRIORITY(r6, 0x40045644, 0x2) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000100)) r9 = syz_open_pts(r8, 0x0) dup3(r9, r7, 0x0) ioctl$SIOCGIFHWADDR(r7, 0x8927, &(0x7f0000000280)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000380)={0x3, 0x28000000000000, 0x5, 0x200, 0x4, [{0x7f, 0x2, 0x1dc, 0x0, 0x0, 0x80}, {0x5, 0x20, 0x4, 0x0, 0x0, 0x208}, {0x0, 0x20, 0x7, 0x0, 0x0, 0x4000}, {0xffffffff, 0x4, 0x0, 0x0, 0x0, 0x2}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:16 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000001180)=ANY=[@ANYBLOB="bf000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa2b68da85f43bcb4417ff90e4c072b5ef30d154ea01a3c323be83481a01d3cd579f2c4653b9362e02fb6ba2370e77557b324bd8b6d4853736d5495bd060a784e79c60260da47ec1cf8d893d102446ad8eec2b3707df5b9f922b17e78ded7943f15b1eb36d56fbf91bf5d414069b81c8457d682c1a323d148b5ad4939399635f93338b459586f4c9623702c88f8730ddedf242ecb483fd1e1fbe7f10bd9e9611e76b68b106175b074b680f66a1c5dac8ce27e5fd0f0a79201f7335d60f28c533a544ed41539547c9a2b69aa6b03aa2798cfce4aa9c51235db030f97517b5a89c176547e5d58a08847aa12632386666e23becd4f2697bedb5e90c8028242dab20e3384f3c76893319e5b68bfccb8af0951c9d53953ac24af38ae47d53961c03360de971f35080c6d5c2da4c3adb3f4c3c58f970f797b7e2f338136cb402cdcbc4b2ece7d1d90f62c7a6cd259defb0298c9691df9c2aa9ada0fc16574b03cce54a92cb35b051aacced5297c13ca4b94493d7a30c964324fe9b3418c70c49b3b13c9578075f21f850bf715599fe03db494a1920036c6a"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e21, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x34e, &(0x7f0000000040)=[{0x28, 0x29, 0x9, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1209.007245] FAULT_INJECTION: forcing a failure. [ 1209.007245] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.074055] CPU: 1 PID: 22736 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1209.081018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1209.090544] Call Trace: [ 1209.093137] dump_stack+0x172/0x1f0 [ 1209.096781] should_fail.cold+0xa/0x1b [ 1209.100665] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1209.105763] ? lock_downgrade+0x810/0x810 [ 1209.109906] __should_failslab+0x121/0x190 [ 1209.114565] should_failslab+0x9/0x14 [ 1209.118443] __kmalloc+0x2e2/0x750 [ 1209.121976] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1209.127503] ? strnlen_user+0x15f/0x1e0 [ 1209.131477] ? __x64_sys_memfd_create+0x13c/0x470 [ 1209.136311] __x64_sys_memfd_create+0x13c/0x470 [ 1209.140976] ? memfd_fcntl+0x1a50/0x1a50 [ 1209.145035] do_syscall_64+0xfd/0x620 [ 1209.148827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1209.154006] RIP: 0033:0x4598e9 [ 1209.157464] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1209.176380] RSP: 002b:00007efcfcb51a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1209.184084] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004598e9 [ 1209.191430] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be808 [ 1209.198701] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1209.206132] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efcfcb526d4 [ 1209.213389] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000007 [ 1209.541969] IPVS: ftp: loaded support on port[0] = 21 [ 1209.762234] chnl_net:caif_netlink_parms(): no params data found [ 1209.799898] device bridge_slave_1 left promiscuous mode [ 1209.807376] bridge0: port 2(bridge_slave_1) entered disabled state [ 1209.875716] device bridge_slave_0 left promiscuous mode [ 1209.882625] bridge0: port 1(bridge_slave_0) entered disabled state [ 1209.958704] device bridge_slave_1 left promiscuous mode [ 1209.975703] bridge0: port 2(bridge_slave_1) entered disabled state [ 1210.016615] device bridge_slave_0 left promiscuous mode [ 1210.022228] bridge0: port 1(bridge_slave_0) entered disabled state [ 1210.207139] device hsr_slave_1 left promiscuous mode [ 1210.248177] device hsr_slave_0 left promiscuous mode [ 1210.298054] team0 (unregistering): Port device team_slave_1 removed [ 1210.310608] team0 (unregistering): Port device team_slave_0 removed [ 1210.322389] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1210.349180] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1210.424819] bond0 (unregistering): Released all slaves [ 1210.505937] device hsr_slave_1 left promiscuous mode [ 1210.548881] device hsr_slave_0 left promiscuous mode [ 1210.597602] team0 (unregistering): Port device team_slave_1 removed [ 1210.610840] team0 (unregistering): Port device team_slave_0 removed [ 1210.622606] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1210.650182] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1210.739133] bond0 (unregistering): Released all slaves [ 1210.850775] bridge0: port 1(bridge_slave_0) entered blocking state [ 1210.857783] bridge0: port 1(bridge_slave_0) entered disabled state [ 1210.865571] device bridge_slave_0 entered promiscuous mode [ 1210.873070] bridge0: port 2(bridge_slave_1) entered blocking state [ 1210.880157] bridge0: port 2(bridge_slave_1) entered disabled state [ 1210.887821] device bridge_slave_1 entered promiscuous mode [ 1210.906203] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1210.915946] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1210.934652] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1210.942175] team0: Port device team_slave_0 added [ 1210.948174] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1210.955838] team0: Port device team_slave_1 added [ 1210.961110] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1210.969537] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1211.035712] device hsr_slave_0 entered promiscuous mode [ 1211.076173] device hsr_slave_1 entered promiscuous mode [ 1211.113948] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1211.121486] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1211.164069] bridge0: port 2(bridge_slave_1) entered blocking state [ 1211.170467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1211.177209] bridge0: port 1(bridge_slave_0) entered blocking state [ 1211.183667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1211.199190] IPVS: ftp: loaded support on port[0] = 21 [ 1211.352727] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1211.364729] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1211.427545] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1211.443044] chnl_net:caif_netlink_parms(): no params data found [ 1211.460263] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1211.467135] 8021q: adding VLAN 0 to HW filter on device team0 [ 1211.474035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1211.482690] bridge0: port 1(bridge_slave_0) entered disabled state [ 1211.489994] bridge0: port 2(bridge_slave_1) entered disabled state [ 1211.498471] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1211.525079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1211.532742] bridge0: port 1(bridge_slave_0) entered blocking state [ 1211.539373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1211.548007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1211.556585] bridge0: port 2(bridge_slave_1) entered blocking state [ 1211.563070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1211.589054] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1211.598547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1211.609595] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1211.649561] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1211.662621] bridge0: port 1(bridge_slave_0) entered blocking state [ 1211.681454] bridge0: port 1(bridge_slave_0) entered disabled state [ 1211.689929] device bridge_slave_0 entered promiscuous mode [ 1211.708426] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1211.732462] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1211.741904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1211.759193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1211.771798] bridge0: port 2(bridge_slave_1) entered blocking state [ 1211.780422] bridge0: port 2(bridge_slave_1) entered disabled state [ 1211.804324] device bridge_slave_1 entered promiscuous mode [ 1211.821910] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1211.877031] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1211.888462] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1211.934188] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1211.998954] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1212.008178] team0: Port device team_slave_0 added [ 1212.016352] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1212.047627] team0: Port device team_slave_1 added [ 1212.060178] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1212.068125] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1212.089207] EXT4-fs (sda1): re-mounted. Opts: 06:01:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:20 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x39030000, @sync=0x0}}) 06:01:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x39, "27020201594a87ccfe800000000000"}], 0x20}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:20 executing program 2 (fault-call:12 fault-nth:1): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:20 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = socket(0x10, 0x3, 0x6) sendto(r1, &(0x7f0000000040)="12000000baf56980007b85dda8d785bf0bbf", 0x12, 0x0, 0x0, 0x0) connect$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0xeed, @mcast2, 0x400}}, 0x24) r2 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r2}, 0x14}, 0x1, 0x0, 0x0, 0x4040}, 0x4040000) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000018c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100408}, 0xc, &(0x7f0000001880)={&(0x7f0000001840)={0x38, r2, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x100}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x8, 0x4000) pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x81800) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4504000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r2, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 1212.206778] device hsr_slave_0 entered promiscuous mode [ 1212.234170] device hsr_slave_1 entered promiscuous mode [ 1212.294640] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1212.301779] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1212.304208] FAULT_INJECTION: forcing a failure. [ 1212.304208] name failslab, interval 1, probability 0, space 0, times 0 06:01:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x39, "27020201594a87ccfe800000000000"}], 0x20}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:20 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x3f000000, @sync=0x0}}) [ 1212.350423] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1212.359274] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=62906 sclass=netlink_xfrm_socket pig=22766 comm=syz-executor.0 [ 1212.403881] CPU: 0 PID: 22765 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1212.410849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1212.420216] Call Trace: [ 1212.422827] dump_stack+0x172/0x1f0 [ 1212.426529] should_fail.cold+0xa/0x1b [ 1212.430547] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1212.435685] ? lock_downgrade+0x810/0x810 [ 1212.439858] __should_failslab+0x121/0x190 [ 1212.444111] should_failslab+0x9/0x14 [ 1212.445142] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=22766 comm=syz-executor.0 [ 1212.447928] kmem_cache_alloc+0x2ae/0x700 [ 1212.447949] ? __alloc_fd+0x44d/0x560 [ 1212.467972] ? shmem_destroy_callback+0xc0/0xc0 [ 1212.472653] shmem_alloc_inode+0x1c/0x50 [ 1212.476727] alloc_inode+0x64/0x190 [ 1212.480369] new_inode_pseudo+0x19/0xf0 [ 1212.484358] new_inode+0x1f/0x40 [ 1212.487731] shmem_get_inode+0x84/0x780 [ 1212.491718] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1212.496574] shmem_file_setup+0x66/0x90 [ 1212.500574] __x64_sys_memfd_create+0x2a2/0x470 [ 1212.505345] ? memfd_fcntl+0x1a50/0x1a50 [ 1212.509416] ? do_syscall_64+0x26/0x620 [ 1212.513393] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1212.517984] ? trace_hardirqs_on+0x67/0x220 [ 1212.522332] do_syscall_64+0xfd/0x620 [ 1212.526263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1212.531458] RIP: 0033:0x4598e9 [ 1212.534666] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:01:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1212.553757] RSP: 002b:00007efcfcb30a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1212.561749] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004598e9 [ 1212.569032] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be808 [ 1212.576317] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1212.583610] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efcfcb316d4 [ 1212.590890] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000007 06:01:20 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x40000000, @sync=0x0}}) 06:01:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1212.698257] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1212.722541] 8021q: adding VLAN 0 to HW filter on device bond0 06:01:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x39, "27020201594a87ccfe800000000000"}], 0x20}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1212.788146] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1212.880986] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1212.917852] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1212.950749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1212.990995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1213.024138] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1213.037592] 8021q: adding VLAN 0 to HW filter on device team0 [ 1213.041565] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=62906 sclass=netlink_xfrm_socket pig=22766 comm=syz-executor.0 [ 1213.072480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1213.104175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1213.116669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1213.146347] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=22770 comm=syz-executor.0 [ 1213.152941] bridge0: port 1(bridge_slave_0) entered blocking state [ 1213.165020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1213.239374] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1213.266165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1213.276977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1213.288540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1213.300126] bridge0: port 2(bridge_slave_1) entered blocking state [ 1213.306662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1213.335735] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1213.353601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1213.369847] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1213.404430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1213.429785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1213.447123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1213.459929] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1213.482902] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1213.500723] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1213.519146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1213.549850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1213.571359] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1213.579031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1213.588262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1213.602049] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1213.610016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1213.621851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1213.639634] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1213.647718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1213.669640] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1213.685821] 8021q: adding VLAN 0 to HW filter on device batadv0 06:01:22 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'bat0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:22 executing program 2 (fault-call:12 fault-nth:2): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:22 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xc3ffffff, @sync=0x0}}) 06:01:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x39, "27020201594a87ccfe80000000000000"}], 0x20}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:22 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000280)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}) 06:01:22 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xfdfdffff, @sync=0x0}}) [ 1214.134884] FAULT_INJECTION: forcing a failure. [ 1214.134884] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.181826] CPU: 0 PID: 22803 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1214.188896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1214.198284] Call Trace: [ 1214.200893] dump_stack+0x172/0x1f0 [ 1214.204548] should_fail.cold+0xa/0x1b [ 1214.208459] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1214.213581] ? percpu_ref_put_many+0x94/0x190 [ 1214.218107] __should_failslab+0x121/0x190 [ 1214.222873] should_failslab+0x9/0x14 [ 1214.226690] kmem_cache_alloc+0x2ae/0x700 [ 1214.230853] ? map_id_range_down+0x1ee/0x370 [ 1214.235280] ? __put_user_ns+0x70/0x70 [ 1214.239186] selinux_inode_alloc_security+0xb6/0x2a0 [ 1214.244306] security_inode_alloc+0x8a/0xd0 [ 1214.248645] inode_init_always+0x56e/0xb40 [ 1214.252888] alloc_inode+0x81/0x190 [ 1214.256520] new_inode_pseudo+0x19/0xf0 [ 1214.260499] new_inode+0x1f/0x40 [ 1214.263874] shmem_get_inode+0x84/0x780 [ 1214.268466] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1214.273320] shmem_file_setup+0x66/0x90 [ 1214.277308] __x64_sys_memfd_create+0x2a2/0x470 06:01:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x39, "27020201594a87ccfe80000000000000"}], 0x20}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1214.282086] ? memfd_fcntl+0x1a50/0x1a50 [ 1214.286243] do_syscall_64+0xfd/0x620 [ 1214.290062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1214.295255] RIP: 0033:0x4598e9 [ 1214.298456] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1214.317367] RSP: 002b:00007efcfcb51a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1214.325104] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004598e9 [ 1214.332500] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be808 [ 1214.339765] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1214.347130] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efcfcb526d4 [ 1214.354400] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000007 06:01:22 executing program 2 (fault-call:12 fault-nth:3): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:22 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000c40)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b4a303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa5f3e9a60bc8be830c48f4659c121054b83"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r14 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r15 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r15, 0x40045431, &(0x7f0000000100)) r16 = syz_open_pts(r15, 0x0) dup3(r16, r14, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f00000003c0)={0x0, r17+30000000}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f00000003c0)={0x0, r18+30000000}, 0x0) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r20 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r20, 0x40045431, &(0x7f0000000100)) r21 = syz_open_pts(r20, 0x0) dup3(r21, r19, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYRESOCT, @ANYPTR=&(0x7f0000000b00)=ANY=[@ANYRES64=r14, @ANYBLOB="22a107caf9c4a64161cdb1a5c67e", @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYPTR64, @ANYPTR, @ANYRESOCT=r4, @ANYPTR64], @ANYRESHEX, @ANYBLOB="3d85cc9f42b3b834806ee64a42c282faa8493fb8474627337512038788e9f15a6ba8476c07c3be04855c40cc326b05311e1acb696a7272d1cac56d6e72885b34466eaecab626b64cefa5c82a4cde5bc7fc87eb54aff488d9c43ab70aea357da9360467cf34937b47fef540fcf171dacb8943dc553ab77a96f68c064dc91639a82e7c0a43da43eae0d9a9708db6db935d9a01da2977f8b1e027fd0444201160b3a00bc7399c194cfa0dfe513593e45f5af8ac8c2a37a6c58cd63b38f3791a207d48d1439a3e72343e205e94deee64891f300f4aa335a8a1a1b451e650d7fe40b2a5b80df6129dde444d500f69251007"], @ANYRES64=r17, @ANYRESHEX=r18, @ANYRESHEX=r21], 0x5}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r22, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r23 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r22, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r23, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r23, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:22 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp6\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x1) lsetxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0xcbfe, @rand_addr="4c7882f65f3dc020b050a539a99f2377", 0x8}, {0xa, 0x4e22, 0x6, @local, 0x200}, r4, 0x1}}, 0x48) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1214.645722] FAULT_INJECTION: forcing a failure. [ 1214.645722] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.681551] CPU: 1 PID: 22828 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1214.688649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1214.698354] Call Trace: [ 1214.700964] dump_stack+0x172/0x1f0 [ 1214.704732] should_fail.cold+0xa/0x1b [ 1214.708643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1214.713762] ? percpu_ref_put_many+0x94/0x190 [ 1214.718871] __should_failslab+0x121/0x190 [ 1214.723111] should_failslab+0x9/0x14 [ 1214.726928] kmem_cache_alloc+0x2ae/0x700 [ 1214.731087] ? map_id_range_down+0x1ee/0x370 [ 1214.735673] ? __put_user_ns+0x70/0x70 [ 1214.739677] selinux_inode_alloc_security+0xb6/0x2a0 [ 1214.744797] security_inode_alloc+0x8a/0xd0 [ 1214.749120] inode_init_always+0x56e/0xb40 [ 1214.753452] alloc_inode+0x81/0x190 [ 1214.757127] new_inode_pseudo+0x19/0xf0 [ 1214.761129] new_inode+0x1f/0x40 [ 1214.764506] shmem_get_inode+0x84/0x780 [ 1214.768504] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1214.773457] shmem_file_setup+0x66/0x90 [ 1214.777466] __x64_sys_memfd_create+0x2a2/0x470 [ 1214.782155] ? memfd_fcntl+0x1a50/0x1a50 [ 1214.786933] ? do_syscall_64+0x26/0x620 [ 1214.791181] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1214.796007] ? trace_hardirqs_on+0x67/0x220 [ 1214.800640] do_syscall_64+0xfd/0x620 [ 1214.804583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1214.809784] RIP: 0033:0x4598e9 [ 1214.812981] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1214.832255] RSP: 002b:00007efcfcb51a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1214.840112] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004598e9 [ 1214.848623] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be808 [ 1214.856026] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1214.863307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efcfcb526d4 [ 1214.870862] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000007 [ 1215.113522] IPVS: ftp: loaded support on port[0] = 21 [ 1215.203165] chnl_net:caif_netlink_parms(): no params data found [ 1215.241746] bridge0: port 1(bridge_slave_0) entered blocking state [ 1215.248382] bridge0: port 1(bridge_slave_0) entered disabled state [ 1215.256068] device bridge_slave_0 entered promiscuous mode [ 1215.264389] device bridge_slave_1 left promiscuous mode [ 1215.270161] bridge0: port 2(bridge_slave_1) entered disabled state [ 1215.324495] device bridge_slave_0 left promiscuous mode [ 1215.330428] bridge0: port 1(bridge_slave_0) entered disabled state [ 1215.495747] device hsr_slave_1 left promiscuous mode [ 1215.558889] device hsr_slave_0 left promiscuous mode [ 1215.607768] team0 (unregistering): Port device team_slave_1 removed [ 1215.621378] team0 (unregistering): Port device team_slave_0 removed [ 1215.633129] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1215.659952] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1215.761066] bond0 (unregistering): Released all slaves [ 1215.828379] bridge0: port 2(bridge_slave_1) entered blocking state [ 1215.835255] bridge0: port 2(bridge_slave_1) entered disabled state [ 1215.842565] device bridge_slave_1 entered promiscuous mode [ 1215.870207] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1215.890283] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1215.926865] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1215.934722] team0: Port device team_slave_0 added [ 1215.940194] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1215.948049] team0: Port device team_slave_1 added [ 1215.953803] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1215.961161] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1216.016530] device hsr_slave_0 entered promiscuous mode [ 1216.063709] device hsr_slave_1 entered promiscuous mode [ 1216.103930] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1216.110974] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1216.128886] bridge0: port 2(bridge_slave_1) entered blocking state [ 1216.137349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1216.137502] bridge0: port 1(bridge_slave_0) entered blocking state [ 1216.150426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1216.189768] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1216.197078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1216.203628] bridge0: port 1(bridge_slave_0) entered disabled state [ 1216.211038] bridge0: port 2(bridge_slave_1) entered disabled state [ 1216.218670] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1216.229600] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1216.239667] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1216.246314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1216.258225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1216.306866] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1216.312980] 8021q: adding VLAN 0 to HW filter on device team0 [ 1216.323855] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1216.331057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1216.340190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1216.348317] bridge0: port 1(bridge_slave_0) entered blocking state [ 1216.354727] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1216.365130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1216.374199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1216.382636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1216.391793] bridge0: port 2(bridge_slave_1) entered blocking state [ 1216.398813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1216.415704] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1216.430887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1216.451107] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1216.459709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1216.480414] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1216.498679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1216.516965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1216.538379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1216.552795] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1216.565376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1216.574457] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1216.585081] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1216.602511] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1216.609593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1216.625767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1216.639412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1216.648339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1216.663949] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1216.670063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1216.693995] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1216.710412] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1216.952931] EXT4-fs (sda1): re-mounted. Opts: 06:01:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:25 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xfeffffff, @sync=0x0}}) 06:01:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x39, "27020201594a87ccfe80000000000000"}], 0x20}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:25 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000280)={0x0, 0x0, [0x7f, 0xb6fc, 0x200, 0x1]}) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:25 executing program 2 (fault-call:12 fault-nth:4): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x7, &(0x7f0000000040)=""/1, &(0x7f00000001c0)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000000001000600000000000000010000800000000044640000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000007f000200000000002360e5fb7e6ad816f4f88eab684ba66cdd0df38905a42b8c9963d479f2fe7f088827a4da7d0ffaec1dd9d103291ae12272fdbcdb30bdf89feb65c045908e04a70000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffffffff0000000042f60000000000003464000000d6a08337eaf89b279aeef9d5637248b2a2bd6ace698815c1e1d62d88edcb7c0197dff80b41b43470c07947d6aaf3fdb0aceb338a0852dbb01101fa65e7af2988fdb9f5e13faed63a5502a7488da102e3db8f2e46b6cdf40e0bccf5fc0663661cc18f75baff5c400896ada2c5034c24258f277a62bbb0ba0bb8dd0bc6e4ae20ef"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:25 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xfffffdfd, @sync=0x0}}) 06:01:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1217.206965] FAULT_INJECTION: forcing a failure. [ 1217.206965] name failslab, interval 1, probability 0, space 0, times 0 06:01:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000000001000600000000000000010000800000000044640000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000007f000200000000002360e5fb7e6ad816f4f88eab684ba66cdd0df38905a42b8c9963d479f2fe7f088827a4da7d0ffaec1dd9d103291ae12272fdbcdb30bdf89feb65c045908e04a70000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffffffff0000000042f60000000000003464000000d6a08337eaf89b279aeef9d5637248b2a2bd6ace698815c1e1d62d88edcb7c0197dff80b41b43470c07947d6aaf3fdb0aceb338a0852dbb01101fa65e7af2988fdb9f5e13faed63a5502a7488da102e3db8f2e46b6cdf40e0bccf5fc0663661cc18f75baff5c400896ada2c5034c24258f277a62bbb0ba0bb8dd0bc6e4ae20ef"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2840000000000000290000003900000027020201594a87ccfe800000000000005900000000000000"], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1217.309051] CPU: 1 PID: 22870 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1217.316061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.325447] Call Trace: [ 1217.328071] dump_stack+0x172/0x1f0 [ 1217.331858] should_fail.cold+0xa/0x1b [ 1217.335785] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1217.341114] ? lock_downgrade+0x810/0x810 [ 1217.345493] __should_failslab+0x121/0x190 [ 1217.349849] should_failslab+0x9/0x14 [ 1217.353675] kmem_cache_alloc+0x2ae/0x700 [ 1217.358037] __alloc_file+0x27/0x330 [ 1217.361777] alloc_empty_file+0x72/0x170 [ 1217.365904] alloc_file+0x5e/0x4d0 [ 1217.369446] alloc_file_pseudo+0x189/0x280 [ 1217.373870] ? alloc_file+0x4d0/0x4d0 [ 1217.377755] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1217.383387] ? kasan_check_write+0x14/0x20 [ 1217.387692] __shmem_file_setup.part.0+0x108/0x2b0 [ 1217.392616] shmem_file_setup+0x66/0x90 [ 1217.396799] __x64_sys_memfd_create+0x2a2/0x470 [ 1217.401532] ? memfd_fcntl+0x1a50/0x1a50 [ 1217.406296] ? do_syscall_64+0x26/0x620 [ 1217.410261] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1217.414838] ? trace_hardirqs_on+0x67/0x220 [ 1217.419246] do_syscall_64+0xfd/0x620 [ 1217.423040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1217.428437] RIP: 0033:0x4598e9 [ 1217.431833] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1217.450911] RSP: 002b:00007efcfcb30a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1217.458789] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004598e9 [ 1217.466137] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be808 [ 1217.473403] RBP: 000000000075bfc8 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1217.481019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efcfcb316d4 [ 1217.488461] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000007 06:01:25 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xffffffc3, @sync=0x0}}) 06:01:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:25 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x3, 0x4a9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:26 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) exit_group(0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:26 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xfffffffe, @sync=0x0}}) 06:01:26 executing program 2 (fault-call:12 fault-nth:5): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, 0x0) 06:01:26 executing program 4: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x0, 0x8000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffa629f5d0a31c682213f2c86beccf7e7077193a59bd28715842aebabae3fd5744b9a9353b2b50303472209754da08000000baaf7db87a76d70000443e24ae3ac3f5e100042a4d14159aaa0000"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r8 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r9, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r5, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) 06:01:26 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x100000000000000, @sync=0x0}}) 06:01:26 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f0000000280)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x15, 0x80005, 0x0) getsockopt(r6, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000bc0)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd000200000000d26ebaaac853f3f997fd086b240000303072b87ab1894dfd443e24ae3ac3f5e100042a4d1e159aaa2860370f2deb8cb049dc76ebfc6de538c249c52fd7fc0b95583bb32821c45ef8cf3758b26c50e312f55095e9c897f021fc31d5ef30e4be95152ae7ae9f4c690f07e4800bb6a8129f60d2"], 0x0) r7 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r8 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r10, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r11 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000b00)=ANY=[@ANYRESHEX=r9, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16=0x0, @ANYRES16, @ANYRESDEC, @ANYPTR=&(0x7f00000002c0)=ANY=[]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000007c0)={r13, 0xfff, 0x10}, &(0x7f00000002c0)=0xc) r14 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000680)={r13, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r7, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r14, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r1, 0x1, 0x3, &(0x7f0000000700)=0x1, 0x4) ioctl(r14, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, 0x0) 06:01:26 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x200000000000000, @sync=0x0}}) [ 1218.383592] FAULT_INJECTION: forcing a failure. [ 1218.383592] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.543656] CPU: 1 PID: 22916 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1218.550664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.560126] Call Trace: [ 1218.562757] dump_stack+0x172/0x1f0 [ 1218.566520] should_fail.cold+0xa/0x1b [ 1218.570431] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1218.575556] ? lock_downgrade+0x810/0x810 [ 1218.579732] __should_failslab+0x121/0x190 [ 1218.584076] should_failslab+0x9/0x14 [ 1218.587909] kmem_cache_alloc+0x2ae/0x700 [ 1218.592076] ? rcu_read_lock_sched_held+0x110/0x130 [ 1218.597109] selinux_file_alloc_security+0xb4/0x190 [ 1218.602138] security_file_alloc+0x63/0xa0 [ 1218.606426] __alloc_file+0xcf/0x330 [ 1218.610162] alloc_empty_file+0x72/0x170 [ 1218.614241] alloc_file+0x5e/0x4d0 [ 1218.617800] alloc_file_pseudo+0x189/0x280 [ 1218.622058] ? alloc_file+0x4d0/0x4d0 [ 1218.625964] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1218.632579] ? kasan_check_write+0x14/0x20 [ 1218.636929] __shmem_file_setup.part.0+0x108/0x2b0 [ 1218.641882] shmem_file_setup+0x66/0x90 [ 1218.645883] __x64_sys_memfd_create+0x2a2/0x470 [ 1218.650571] ? memfd_fcntl+0x1a50/0x1a50 [ 1218.654919] ? do_syscall_64+0x26/0x620 [ 1218.658909] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1218.663505] ? trace_hardirqs_on+0x67/0x220 [ 1218.667843] do_syscall_64+0xfd/0x620 [ 1218.671707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1218.676913] RIP: 0033:0x4598e9 [ 1218.680317] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1218.699319] RSP: 002b:00007efcfcaeea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1218.707046] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004598e9 [ 1218.714331] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be808 [ 1218.721616] RBP: 000000000075c118 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1218.730730] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efcfcaef6d4 06:01:26 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x300000000000000, @sync=0x0}}) [ 1218.738017] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000004 [ 1219.814083] device bridge_slave_1 left promiscuous mode [ 1219.819573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1219.864404] device bridge_slave_0 left promiscuous mode [ 1219.869896] bridge0: port 1(bridge_slave_0) entered disabled state [ 1219.997232] device hsr_slave_1 left promiscuous mode [ 1220.038869] device hsr_slave_0 left promiscuous mode [ 1220.097713] team0 (unregistering): Port device team_slave_1 removed [ 1220.118689] team0 (unregistering): Port device team_slave_0 removed [ 1220.131020] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1220.169079] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1220.245581] bond0 (unregistering): Released all slaves [ 1220.352017] IPVS: ftp: loaded support on port[0] = 21 [ 1220.445535] chnl_net:caif_netlink_parms(): no params data found [ 1220.479395] bridge0: port 1(bridge_slave_0) entered blocking state [ 1220.487150] bridge0: port 1(bridge_slave_0) entered disabled state [ 1220.494591] device bridge_slave_0 entered promiscuous mode [ 1220.533661] bridge0: port 2(bridge_slave_1) entered blocking state [ 1220.540047] bridge0: port 2(bridge_slave_1) entered disabled state [ 1220.554009] device bridge_slave_1 entered promiscuous mode [ 1220.582082] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1220.600173] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1220.628805] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1220.641181] team0: Port device team_slave_0 added [ 1220.648977] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1220.661430] team0: Port device team_slave_1 added [ 1220.671656] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1220.684075] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1220.776233] device hsr_slave_0 entered promiscuous mode [ 1220.853686] device hsr_slave_1 entered promiscuous mode [ 1220.894073] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1220.901270] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1220.940862] bridge0: port 2(bridge_slave_1) entered blocking state [ 1220.947959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1220.954649] bridge0: port 1(bridge_slave_0) entered blocking state [ 1220.961120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1221.081128] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1221.102192] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1221.123173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1221.139503] bridge0: port 1(bridge_slave_0) entered disabled state [ 1221.150745] bridge0: port 2(bridge_slave_1) entered disabled state [ 1221.176031] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1221.182161] 8021q: adding VLAN 0 to HW filter on device team0 [ 1221.217254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1221.225257] bridge0: port 1(bridge_slave_0) entered blocking state [ 1221.231621] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1221.246994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1221.254908] bridge0: port 2(bridge_slave_1) entered blocking state [ 1221.261282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1221.282817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1221.291392] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1221.302142] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1221.329863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1221.340602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1221.350261] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1221.359334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1221.384140] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1221.407483] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1221.553428] EXT4-fs (sda1): re-mounted. Opts: 06:01:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:29 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x400000000000000, @sync=0x0}}) 06:01:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x15, 0x80005, 0x0) getsockopt(r5, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r6 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, 0x0, &(0x7f0000000780)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r9, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x358, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x3d0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r10, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00'}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$bt_BT_POWER(r6, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000300)) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r11, 0x8982, &(0x7f0000000000)) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, 0x0) 06:01:29 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) getuid() ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/mls\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000140)={0x2, 0x0, 0x8, 0x7, 0x8, 0x200}) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f00000001c0)={0x11, 0x95, &(0x7f0000000280)="8d8db6e554f3f78debd06931444108bba427186f1256ce9742e799b1d8a9ad83bba4aaec893154f0d9ac41ea509d980ae6a70049429a0e943318a96d90eb9f3772497c1137c82f91abb88b61476e5d050433ef82981499513fc76bc1e514c05b5623e98a5d5c75977bd8fafc67f3748bb9c0e5093a4673d1df501a5d5df4cfba65972f73f8b347b8f1d387fd822f314c35f95f8e4c"}) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x38, 0x5, @thr={&(0x7f0000000340)="6ef930e8c01148184dbdecd1d0585e429d83a44225f0f0bc03deba9a9cdbd6ddc6dc756ce0c3ee5310d30c333e2e3f389dd69d62e472166eef145c2ce63124b20960ba5c1ec53125ca6a7aed2b6dc82fa0164affc59cfecf742725b50d0aeb23b56e6a0a28a1e946a0f0a28561f463b195a49d79475f4eb5782161395f0e3082d3c3486aa1e722005ba1571d6f5d9b4fb6d82727763c5e2c40a165675fcb4829a7626bbf158a49676dc24b8c537f8e317063544c43e69cb875f86a07018c4172ba3128323f12507f9817f1a7414658076079e03d70c874227b57a622449b1525476de3f549b94389f4a47ca89d10b5c9966fd28e78720e", &(0x7f0000000440)="bcfa5eee34519dae55bf1f497e05c740c601c9b927b5202345d7e4f46a40a8edb07d24561cb9220aca913f81a9ce09bc300038bd711b0300c96b435e6bb8c3"}}, &(0x7f0000000500)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:29 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dc7462aee4512d59423e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000000001000600000000000000010000800000000044640000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000007f000200000000002360e5fb7e6ad816f4f88eab684ba66cdd0df38905a42b8c9963d479f2fe7f088827a4da7d0ffaec1dd9d103291ae12272fdbcdb30bdf89feb65c045908e04a70000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffffffff0000000042f60000000000003464000000d6a08337eaf89b279aeef9d5637248b2a2bd6ace698815c1e1d62d88edcb7c0197dff80b41b43470c07947d6aaf3fdb0aceb338a0852dbb01101fa65e7af2988fdb9f5e13faed63a5502a7488da102e3db8f2e46b6cdf40e0bccf5fc0663661cc18f75baff5c400896ada2c5034c24258f277a62bbb0ba0bb8dd0bc6e4ae20ef"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:29 executing program 2 (fault-call:12 fault-nth:6): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:29 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x600000000000000, @sync=0x0}}) [ 1221.763139] FAULT_INJECTION: forcing a failure. [ 1221.763139] name failslab, interval 1, probability 0, space 0, times 0 [ 1221.830571] CPU: 0 PID: 22961 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1221.837642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1221.847447] Call Trace: [ 1221.850054] dump_stack+0x172/0x1f0 [ 1221.853696] should_fail.cold+0xa/0x1b [ 1221.857595] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1221.862709] ? lock_downgrade+0x810/0x810 [ 1221.866887] __should_failslab+0x121/0x190 [ 1221.871244] should_failslab+0x9/0x14 [ 1221.875058] kmem_cache_alloc+0x2ae/0x700 [ 1221.879390] ? do_sys_ftruncate+0x41e/0x550 [ 1221.883724] getname_flags+0xd6/0x5b0 [ 1221.887543] getname+0x1a/0x20 [ 1221.890755] do_sys_open+0x2c9/0x550 [ 1221.894475] ? filp_open+0x80/0x80 [ 1221.898031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1221.902801] ? do_syscall_64+0x26/0x620 [ 1221.906802] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1221.912186] ? do_syscall_64+0x26/0x620 [ 1221.916172] __x64_sys_open+0x7e/0xc0 [ 1221.919986] do_syscall_64+0xfd/0x620 [ 1221.923800] entry_SYSCALL_64_after_hwframe+0x49/0xbe 06:01:30 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80000, 0x5) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600f60705006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x202, 0x0, 0x3f}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000001180)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x515) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xf01000000000000, @sync=0x0}}) [ 1221.928998] RIP: 0033:0x4137d1 [ 1221.932290] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1221.951784] RSP: 002b:00007efcfcb51a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1221.959508] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004137d1 [ 1221.966776] RDX: 00007efcfcb51b0a RSI: 0000000000000002 RDI: 00007efcfcb51b00 06:01:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x3, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1221.974146] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1221.981689] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000008 [ 1221.989061] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000007 06:01:30 executing program 2 (fault-call:12 fault-nth:7): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1222.211431] EXT4-fs (sda1): re-mounted. Opts: 06:01:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x1300000000000000, @sync=0x0}}) 06:01:30 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2800000000000000290000003900000027020201594a87ccfe800000000000005900080000000000"], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x4, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1222.387616] FAULT_INJECTION: forcing a failure. [ 1222.387616] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.453899] CPU: 1 PID: 22993 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1222.460879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1222.470246] Call Trace: [ 1222.472859] dump_stack+0x172/0x1f0 [ 1222.476610] should_fail.cold+0xa/0x1b [ 1222.480520] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1222.485641] ? ___might_sleep+0x1c6/0x2b0 [ 1222.489817] __should_failslab+0x121/0x190 [ 1222.494160] should_failslab+0x9/0x14 [ 1222.497969] kmem_cache_alloc+0x2ae/0x700 [ 1222.502127] ? do_sys_ftruncate+0x41e/0x550 [ 1222.506730] getname_flags+0xd6/0x5b0 [ 1222.510726] getname+0x1a/0x20 [ 1222.513958] do_sys_open+0x2c9/0x550 [ 1222.517813] ? filp_open+0x80/0x80 [ 1222.521573] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1222.526341] ? do_syscall_64+0x26/0x620 [ 1222.530325] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1222.535698] ? do_syscall_64+0x26/0x620 [ 1222.539795] __x64_sys_open+0x7e/0xc0 [ 1222.543610] do_syscall_64+0xfd/0x620 [ 1222.547862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1222.553076] RIP: 0033:0x4137d1 [ 1222.556292] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1222.575204] RSP: 002b:00007efcfcb51a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1222.582928] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004137d1 [ 1222.590309] RDX: 00007efcfcb51b0a RSI: 0000000000000002 RDI: 00007efcfcb51b00 06:01:30 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='Fdev\rsr \x00'], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x2040004, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x1801000000000000, @sync=0x0}}) 06:01:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1222.597601] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1222.605000] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000008 [ 1222.612289] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000007 06:01:30 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x2403000000000000, @sync=0x0}}) 06:01:31 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x3603000000000000, @sync=0x0}}) 06:01:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:31 executing program 2 (fault-call:12 fault-nth:8): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:31 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x3903000000000000, @sync=0x0}}) 06:01:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) [ 1223.511239] device bridge_slave_1 left promiscuous mode [ 1223.512408] FAULT_INJECTION: forcing a failure. [ 1223.512408] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1223.523011] bridge0: port 2(bridge_slave_1) entered disabled state [ 1223.528759] CPU: 0 PID: 23017 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1223.528769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1223.528773] Call Trace: [ 1223.528797] dump_stack+0x172/0x1f0 [ 1223.528815] should_fail.cold+0xa/0x1b [ 1223.528827] ? mark_held_locks+0xb1/0x100 [ 1223.528845] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1223.571006] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1223.575609] ? retint_kernel+0x2d/0x2d [ 1223.579604] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1223.584560] __alloc_pages_nodemask+0x1ee/0x750 [ 1223.589377] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1223.594494] ? find_held_lock+0x35/0x130 [ 1223.598586] cache_grow_begin+0x91/0x8c0 [ 1223.602668] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1223.608318] ? check_preemption_disabled+0x48/0x290 [ 1223.613356] kmem_cache_alloc+0x63b/0x700 [ 1223.617529] getname_flags+0xd6/0x5b0 [ 1223.621351] getname+0x1a/0x20 [ 1223.624558] do_sys_open+0x2c9/0x550 [ 1223.628802] ? filp_open+0x80/0x80 [ 1223.632443] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1223.637237] ? do_syscall_64+0x26/0x620 [ 1223.641226] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1223.646604] ? do_syscall_64+0x26/0x620 [ 1223.650604] __x64_sys_open+0x7e/0xc0 [ 1223.654424] do_syscall_64+0xfd/0x620 06:01:31 executing program 4: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000100)) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000180)="08f5a9db1287df8ab278c4e73da592c02e16e091a35048e7218a9553558b38120af2") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r3, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0xfa, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000240)={0x5, 0x8, 0x6, 0x4}, &(0x7f00000003c0)=0x3b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680)=r4, 0x4) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x6, 0x73e46034, 0x4, 0x3, 0x0, 0x4, 0x10, 0x4, 0x7, 0x6, 0x2, 0x1, 0x9, 0x5, 0x9, 0x4, 0x2, 0x6, 0x40, 0xfff, 0x4, 0x4, 0x4ad, 0x8c5e, 0xfffffffffffffff7, 0x3, 0x5, 0x8000, 0x8adf, 0x5, 0x100, 0x53, 0x0, 0x9, 0x9, 0x2, 0x0, 0xf005, 0x2, @perf_config_ext={0x4, 0x8}, 0x4, 0x101, 0x0, 0xdd08d3a1eb66e8fd, 0xe86, 0x3, 0x4}, 0xffffffffffffffff, 0x9, r5, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0xffffffffffffffff, r6, 0x0, 0xfea3, &(0x7f0000000400)=',){\x00\x8c\x17\xebp\xd2\xaa\x88\x19dH\xf3\x99\xa4\xcd\xcbG\x9c\"R\x19\x88E\xa14x`\xc3\x8f.\x9f\x14\xadu\x90\xe2\xfbpj\x99\x89\x9b@M\xf8\xea2\xb0\x10\xc3\xe26\xf2\xa7\x8a\xd26\x1dl\xc1\x92V\xa6\x9f\x01\xec\x8fb\r\x16t<\xcc\xc8\x03\xc3\bH\xf3*\xfb\xed\xc8\x05\x86\x89*1\xdf\xa9/*\xe7y,\xd8v\x8d\xd8\xffG\xb2\x9f3\xb7\xab\xf3s\x7f\by\x0e{!\xa5\xc1\xaa:\a\x00\xda\x92\xf1\xb4\xff\xf0\xf0', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r7, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r8, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8defba653f8378e8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8f6cee9243afd6009b100659887ad000"/94, 0x0, 0xc558}, 0x28) socket$inet_udp(0x2, 0x2, 0x0) r9 = socket(0x15, 0x80005, 0x0) getsockopt(r9, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r9, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r10 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r10, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r11 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r12 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r12, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) creat(&(0x7f0000000080)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={{0x0, 0x7530}}, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r14 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r14, 0x0) [ 1223.658242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1223.663436] RIP: 0033:0x4137d1 [ 1223.666648] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1223.685654] RSP: 002b:00007efcfcb51a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1223.693385] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004137d1 [ 1223.700666] RDX: 00007efcfcb51b0a RSI: 0000000000000002 RDI: 00007efcfcb51b00 06:01:31 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x3f00000000000000, @sync=0x0}}) [ 1223.707951] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1223.715268] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000008 [ 1223.722554] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000007 [ 1223.769255] device bridge_slave_0 left promiscuous mode [ 1223.775312] bridge0: port 1(bridge_slave_0) entered disabled state [ 1223.834111] EXT4-fs (sda1): re-mounted. Opts: [ 1223.845107] audit: type=1400 audit(1568181691.921:75): avc: denied { map } for pid=23020 comm="syz-executor.4" path="/dev/nullb0" dev="devtmpfs" ino=15587 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 [ 1224.090150] device hsr_slave_1 left promiscuous mode [ 1224.151839] device hsr_slave_0 left promiscuous mode [ 1224.211822] team0 (unregistering): Port device team_slave_1 removed [ 1224.247851] team0 (unregistering): Port device team_slave_0 removed [ 1224.287942] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1224.358849] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1224.498467] bond0 (unregistering): Released all slaves [ 1225.098835] IPVS: ftp: loaded support on port[0] = 21 [ 1225.221542] chnl_net:caif_netlink_parms(): no params data found [ 1225.292690] bridge0: port 1(bridge_slave_0) entered blocking state [ 1225.306940] bridge0: port 1(bridge_slave_0) entered disabled state [ 1225.314524] device bridge_slave_0 entered promiscuous mode [ 1225.322693] bridge0: port 2(bridge_slave_1) entered blocking state [ 1225.329328] bridge0: port 2(bridge_slave_1) entered disabled state [ 1225.336821] device bridge_slave_1 entered promiscuous mode [ 1225.370844] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1225.387836] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1225.421686] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1225.436852] team0: Port device team_slave_0 added [ 1225.442844] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1225.454880] team0: Port device team_slave_1 added [ 1225.460481] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1225.476850] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1225.546282] device hsr_slave_0 entered promiscuous mode [ 1225.583720] device hsr_slave_1 entered promiscuous mode [ 1225.623945] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1225.631230] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1225.651880] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1225.696920] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1225.706858] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1225.721517] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1225.728539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1225.737419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1225.747292] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1225.754753] 8021q: adding VLAN 0 to HW filter on device team0 [ 1225.765245] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1225.772592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1225.781530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1225.790327] bridge0: port 1(bridge_slave_0) entered blocking state [ 1225.797127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1225.807449] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1225.833117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1225.844128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1225.852262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1225.861704] bridge0: port 2(bridge_slave_1) entered blocking state [ 1225.868376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1225.882936] IPVS: ftp: loaded support on port[0] = 21 [ 1225.891132] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1225.901799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1225.920837] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1225.931356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1225.952463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1225.963066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1225.973136] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1225.986336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1225.994985] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1226.002793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1226.011564] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1226.019553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1226.027443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1226.035262] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1226.058910] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1226.073989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1226.081809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1226.098019] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1226.104926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1226.137393] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1226.171599] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1226.221424] chnl_net:caif_netlink_parms(): no params data found [ 1226.282789] bridge0: port 1(bridge_slave_0) entered blocking state [ 1226.289387] bridge0: port 1(bridge_slave_0) entered disabled state [ 1226.297054] device bridge_slave_0 entered promiscuous mode 06:01:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x5, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:34 executing program 2 (fault-call:12 fault-nth:9): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:34 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000140)={0x0, 0x0, {0x8001, 0x10000, 0x80, 0x7}}) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) gettid() ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0xffffffffffffffff, @local}, {0x2, 0x0, @remote}}) 06:01:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x15, 0x80005, 0x0) getsockopt(r6, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r7 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r8 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r10, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r11 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r9, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r12, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r13, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r14 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000680)={r13, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r7, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r14, 0x541b, &(0x7f0000000300)) ioctl(r1, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r5, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r14, 0x8982, &(0x7f0000000000)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000800)=""/4, 0x4}, {&(0x7f0000000b00)=""/94, 0x5e}], 0x2}, 0x2000) sendmsg(r2, &(0x7f0000013000)={&(0x7f0000013fe4)=@xdp={0x2c, 0x1, r15, 0x22}, 0x1ec, 0x0, 0x0, &(0x7f0000000040)=[{0x3, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0xfffffffffffffde8}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:34 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x4000000000000000, @sync=0x0}}) [ 1226.562217] FAULT_INJECTION: forcing a failure. [ 1226.562217] name failslab, interval 1, probability 0, space 0, times 0 [ 1226.613021] CPU: 0 PID: 23049 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1226.619995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1226.629439] Call Trace: [ 1226.632038] dump_stack+0x172/0x1f0 [ 1226.635683] should_fail.cold+0xa/0x1b [ 1226.639590] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1226.644700] ? lock_downgrade+0x810/0x810 [ 1226.648868] __should_failslab+0x121/0x190 [ 1226.653113] should_failslab+0x9/0x14 [ 1226.657004] kmem_cache_alloc+0x2ae/0x700 [ 1226.661167] ? rcu_read_lock_sched_held+0x110/0x130 [ 1226.666193] selinux_file_alloc_security+0xb4/0x190 [ 1226.671308] security_file_alloc+0x63/0xa0 [ 1226.675665] __alloc_file+0xcf/0x330 [ 1226.679384] alloc_empty_file+0x72/0x170 [ 1226.683454] path_openat+0xef/0x45e0 [ 1226.687279] ? __lock_acquire+0x6ee/0x49c0 [ 1226.691527] ? getname+0x1a/0x20 [ 1226.694893] ? do_sys_open+0x2c9/0x550 [ 1226.698869] ? __x64_sys_open+0x7e/0xc0 [ 1226.702848] ? do_syscall_64+0xfd/0x620 [ 1226.706832] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1226.712200] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1226.716864] ? __lock_is_held+0xb6/0x140 [ 1226.720914] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1226.725669] ? __alloc_fd+0x44d/0x560 [ 1226.729465] do_filp_open+0x1a1/0x280 [ 1226.733258] ? may_open_dev+0x100/0x100 [ 1226.737235] ? lock_downgrade+0x810/0x810 [ 1226.741376] ? kasan_check_read+0x11/0x20 [ 1226.745577] ? do_raw_spin_unlock+0x57/0x270 [ 1226.749985] ? _raw_spin_unlock+0x2d/0x50 [ 1226.754131] ? __alloc_fd+0x44d/0x560 [ 1226.757958] do_sys_open+0x3fe/0x550 [ 1226.761661] ? filp_open+0x80/0x80 [ 1226.765201] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1226.769954] ? do_syscall_64+0x26/0x620 [ 1226.773919] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1226.779274] ? do_syscall_64+0x26/0x620 [ 1226.783291] __x64_sys_open+0x7e/0xc0 [ 1226.787086] do_syscall_64+0xfd/0x620 [ 1226.791051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1226.796228] RIP: 0033:0x4137d1 [ 1226.799411] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1226.818311] RSP: 002b:00007efcfcb51a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1226.826011] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004137d1 [ 1226.833276] RDX: 00007efcfcb51b0a RSI: 0000000000000002 RDI: 00007efcfcb51b00 [ 1226.840712] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1226.847969] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000008 [ 1226.855240] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000007 06:01:35 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000140), &(0x7f00000001c0)=0x30) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:35 executing program 2 (fault-call:12 fault-nth:10): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x7, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1227.197263] FAULT_INJECTION: forcing a failure. [ 1227.197263] name failslab, interval 1, probability 0, space 0, times 0 [ 1227.228778] bridge0: port 2(bridge_slave_1) entered blocking state [ 1227.229935] CPU: 0 PID: 23069 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1227.235790] bridge0: port 2(bridge_slave_1) entered disabled state [ 1227.242068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1227.242075] Call Trace: [ 1227.242099] dump_stack+0x172/0x1f0 [ 1227.242121] should_fail.cold+0xa/0x1b [ 1227.257868] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1227.257884] ? lock_downgrade+0x810/0x810 [ 1227.257907] __should_failslab+0x121/0x190 [ 1227.257925] should_failslab+0x9/0x14 [ 1227.261336] device bridge_slave_1 entered promiscuous mode [ 1227.264135] kmem_cache_alloc_trace+0x2cc/0x760 [ 1227.264152] ? __lockdep_init_map+0x10c/0x5b0 [ 1227.264171] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1227.264190] __kthread_create_on_node+0xf2/0x460 [ 1227.273148] ? lock_acquire+0x1ea/0x3f0 [ 1227.273167] ? __kthread_parkme+0x1b0/0x1b0 [ 1227.273190] ? lo_ioctl+0x1c4/0x20e0 [ 1227.281650] ? lock_downgrade+0x810/0x810 [ 1227.281671] ? mutex_trylock+0x1e0/0x1e0 [ 1227.281686] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1227.291100] kthread_create_on_node+0xbb/0xf0 [ 1227.291115] ? __kthread_create_on_node+0x460/0x460 [ 1227.291134] ? __lockdep_init_map+0x10c/0x5b0 [ 1227.300262] ? __lockdep_init_map+0x10c/0x5b0 [ 1227.300285] lo_ioctl+0xaf2/0x20e0 [ 1227.309761] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1227.309784] ? lo_rw_aio+0x1470/0x1470 [ 1227.318063] blkdev_ioctl+0xc38/0x1ab6 [ 1227.318078] ? blkpg_ioctl+0xa90/0xa90 [ 1227.318097] ? retint_kernel+0x2d/0x2d [ 1227.325942] block_ioctl+0xee/0x130 [ 1227.325954] ? blkdev_fallocate+0x410/0x410 [ 1227.325970] do_vfs_ioctl+0xd5f/0x1380 [ 1227.334883] ? selinux_file_ioctl+0x46f/0x5e0 [ 1227.334897] ? selinux_file_ioctl+0x125/0x5e0 [ 1227.334912] ? ioctl_preallocate+0x210/0x210 [ 1227.334927] ? selinux_file_mprotect+0x620/0x620 [ 1227.344431] ? iterate_fd+0x360/0x360 [ 1227.344447] ? do_sys_open+0x31d/0x550 [ 1227.344468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1227.353424] ? security_file_ioctl+0x8d/0xc0 [ 1227.353442] ksys_ioctl+0xab/0xd0 [ 1227.353458] __x64_sys_ioctl+0x73/0xb0 [ 1227.353477] do_syscall_64+0xfd/0x620 [ 1227.361744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1227.361755] RIP: 0033:0x459757 [ 1227.361771] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1227.369504] RSP: 002b:00007efcfcb51a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1227.369520] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459757 [ 1227.369532] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1227.377266] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1227.377275] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000008 [ 1227.377283] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000007 [ 1227.548287] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1227.920575] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1227.940572] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1227.954971] team0: Port device team_slave_0 added [ 1227.960784] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1227.973926] team0: Port device team_slave_1 added [ 1227.980322] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1228.117514] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1228.186412] device hsr_slave_0 entered promiscuous mode [ 1228.227586] device hsr_slave_1 entered promiscuous mode [ 1228.402154] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1228.410129] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1228.543711] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1228.581564] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1228.588387] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1228.597626] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1228.609584] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1228.737916] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1228.748075] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1228.754422] 8021q: adding VLAN 0 to HW filter on device team0 [ 1228.760880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1228.769625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1228.782418] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1228.790173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1228.798183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1228.806620] bridge0: port 1(bridge_slave_0) entered blocking state [ 1228.813222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1228.941287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1228.951399] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1228.959289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1228.967965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1228.976076] bridge0: port 2(bridge_slave_1) entered blocking state [ 1228.982454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1229.109453] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1229.117540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1229.131525] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1229.138885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1229.152458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1229.160818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1229.169358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1229.290658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1229.298198] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1229.305787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1229.313790] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1229.324901] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1229.335904] device bridge_slave_1 left promiscuous mode [ 1229.341500] bridge0: port 2(bridge_slave_1) entered disabled state [ 1229.384039] device bridge_slave_0 left promiscuous mode [ 1229.389545] bridge0: port 1(bridge_slave_0) entered disabled state [ 1232.645374] device hsr_slave_1 left promiscuous mode [ 1232.686794] device hsr_slave_0 left promiscuous mode [ 1232.728079] team0 (unregistering): Port device team_slave_1 removed [ 1232.739305] team0 (unregistering): Port device team_slave_0 removed [ 1232.751139] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1232.808034] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1232.892385] bond0 (unregistering): Released all slaves [ 1232.937052] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1232.945350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1232.954640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1232.961827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1232.974246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1232.996178] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1233.002588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1233.019814] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1233.030844] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1233.251170] EXT4-fs (sda1): re-mounted. Opts: 06:01:41 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) 06:01:41 executing program 2 (fault-call:12 fault-nth:11): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:41 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xc3ffffff00000000, @sync=0x0}}) 06:01:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x8, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:41 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r14 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r15 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r15, 0x40045431, &(0x7f0000000100)) r16 = syz_open_pts(r15, 0x0) dup3(r16, r14, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r17, &(0x7f0000000340), 0x41395527) r18 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r19 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r19, 0x40045431, &(0x7f0000000100)) r20 = syz_open_pts(r19, 0x0) dup3(r20, r18, 0x0) r21 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r22 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r22, 0x40045431, &(0x7f0000000100)) r23 = syz_open_pts(r22, 0x0) dup3(r23, r21, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r24, &(0x7f0000000340), 0x41395527) r25 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r25, 0x40045431, &(0x7f0000000100)) syz_open_pts(r25, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r14, &(0x7f0000000840)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000001640)=ANY=[@ANYPTR, @ANYBLOB="0753ae3454ee84e10000000000f401", @ANYPTR=&(0x7f0000000bc0)=ANY=[@ANYRESHEX=r5, @ANYRESOCT=r18, @ANYRESHEX=r23, @ANYRES64=r24, @ANYRESHEX=r25], @ANYPTR64=&(0x7f0000000200)=ANY=[], @ANYRESOCT=r14, @ANYBLOB="efd759a42b276d56d749fdd03c770a6d86903994ab9117b54729ab08eb04345618a717997f835360aad8c771d03bc5304d393f4004a61d636309535332ca5c0e944439c1ff4ab2427ec7756d1a10c77d77c076be3aeeb28170c2e3c2113b2b4bdac72578f15cca974d1a4d39cb4b22664a6ed92b43af18cc01478bfe7b", @ANYRESOCT, @ANYRES64, @ANYRESDEC=0x0, @ANYPTR64=&(0x7f0000001740)=ANY=[@ANYBLOB="f9f6d0becf94c0892d8fdaabd75a8caffc905751e07aca739d86256f76f2e7ff6b4fd1039287ff126c907616d521f3e55ce3d8f21d4ac96e40cde905e0846406185d0b5aadb748707b04f2fbdecfc43d097d57e58d59aeb69f82c619c1f6b44338369af77de7d607a3aa09daf7193c85c695f91e59de6e8092ae10ae9fab9f793ffbbe9df06f67794e373d465baa39ec2cb8d8b37b6b0e9f06319f6aac4847aad6c7d0c40dc4b052d41ca1ea98122a50", @ANYRES64=0x0]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000090) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r26, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r27 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r26, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r27, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r27, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:41 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x64000, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={r2}, 0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r2}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000280)={r2, 0x4c, "0da5c602ec76c008fee86215321ca8beb739efb9b0f003e84837c6fc0a331c675d797ae0eaa1e78e55193c742de8e1a007fe3a5dbfcec6a6d2f713bb229796f593ec5afb94d479aa9a06075a"}, &(0x7f00000001c0)=0x54) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000300)={r3, 0x4}, &(0x7f0000000340)=0x8) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:41 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xfdfdffff00000000, @sync=0x0}}) [ 1233.505470] FAULT_INJECTION: forcing a failure. [ 1233.505470] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.563723] CPU: 0 PID: 23106 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1233.570787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1233.580286] Call Trace: [ 1233.583087] dump_stack+0x172/0x1f0 [ 1233.586722] should_fail.cold+0xa/0x1b [ 1233.590696] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1233.595804] ? lock_downgrade+0x810/0x810 [ 1233.599951] __should_failslab+0x121/0x190 [ 1233.604176] should_failslab+0x9/0x14 [ 1233.607965] kmem_cache_alloc+0x2ae/0x700 [ 1233.612099] ? mark_held_locks+0xb1/0x100 [ 1233.616245] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1233.620993] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1233.625827] __kernfs_new_node+0xef/0x680 [ 1233.629984] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1233.634767] ? retint_kernel+0x2d/0x2d [ 1233.638656] kernfs_new_node+0x99/0x130 [ 1233.642624] kernfs_create_dir_ns+0x52/0x160 [ 1233.647030] internal_create_group+0x1cb/0xc30 [ 1233.651602] ? bd_set_size+0x89/0xb0 [ 1233.655318] ? remove_files.isra.0+0x190/0x190 [ 1233.659897] sysfs_create_group+0x20/0x30 [ 1233.664033] lo_ioctl+0xf8f/0x20e0 [ 1233.667567] ? lo_rw_aio+0x1470/0x1470 [ 1233.671451] blkdev_ioctl+0xc38/0x1ab6 [ 1233.675336] ? blkpg_ioctl+0xa90/0xa90 [ 1233.679214] ? find_held_lock+0x35/0x130 [ 1233.683273] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1233.688054] ? __fget+0x340/0x540 [ 1233.691519] block_ioctl+0xee/0x130 [ 1233.695137] ? blkdev_fallocate+0x410/0x410 [ 1233.699506] do_vfs_ioctl+0xd5f/0x1380 [ 1233.703382] ? selinux_file_ioctl+0x46f/0x5e0 [ 1233.707979] ? selinux_file_ioctl+0x125/0x5e0 [ 1233.712463] ? ioctl_preallocate+0x210/0x210 [ 1233.716866] ? selinux_file_mprotect+0x620/0x620 [ 1233.721637] ? iterate_fd+0x360/0x360 [ 1233.725450] ? retint_kernel+0x2d/0x2d [ 1233.729510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1233.735038] ? security_file_ioctl+0x8d/0xc0 [ 1233.739442] ksys_ioctl+0xab/0xd0 [ 1233.743235] __x64_sys_ioctl+0x73/0xb0 [ 1233.747115] do_syscall_64+0xfd/0x620 [ 1233.750907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1233.756085] RIP: 0033:0x459757 [ 1233.759267] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1233.778515] RSP: 002b:00007efcfcb51a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1233.786215] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459757 [ 1233.793479] RDX: 0000000000000008 RSI: 0000000000004c00 RDI: 0000000000000009 [ 1233.800765] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1233.808026] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000008 06:01:41 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) 06:01:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x10, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1233.815282] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000007 06:01:41 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) inotify_add_watch(r0, &(0x7f0000000140)='./file0\x00', 0x70a) 06:01:42 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1234.098458] EXT4-fs (sda1): re-mounted. Opts: 06:01:42 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xfeffffff00000000, @sync=0x0}}) 06:01:42 executing program 2 (fault-call:12 fault-nth:12): openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x22, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:42 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0xffffffff00000000, @sync=0x0}}) 06:01:42 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_flags=0x400}) 06:01:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2c, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1234.776341] FAULT_INJECTION: forcing a failure. [ 1234.776341] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.828562] CPU: 0 PID: 23138 Comm: syz-executor.2 Not tainted 4.19.72 #0 [ 1234.835548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.844912] Call Trace: [ 1234.847581] dump_stack+0x172/0x1f0 [ 1234.853448] should_fail.cold+0xa/0x1b [ 1234.857440] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1234.862556] ? lock_downgrade+0x810/0x810 [ 1234.866735] __should_failslab+0x121/0x190 [ 1234.871199] should_failslab+0x9/0x14 [ 1234.875015] kmem_cache_alloc_trace+0x2cc/0x760 [ 1234.879798] ? __lockdep_init_map+0x10c/0x5b0 [ 1234.884307] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1234.889166] __kthread_create_on_node+0xf2/0x460 [ 1234.893925] ? lock_acquire+0x16f/0x3f0 [ 1234.897924] ? __kthread_parkme+0x1b0/0x1b0 [ 1234.902276] ? lo_ioctl+0x1c4/0x20e0 [ 1234.906088] ? lock_downgrade+0x810/0x810 [ 1234.911040] ? mutex_trylock+0x1e0/0x1e0 [ 1234.915306] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1234.920097] kthread_create_on_node+0xbb/0xf0 [ 1234.925400] ? __kthread_create_on_node+0x460/0x460 [ 1234.930440] ? __lockdep_init_map+0x10c/0x5b0 [ 1234.935085] ? __lockdep_init_map+0x10c/0x5b0 [ 1234.939692] lo_ioctl+0xaf2/0x20e0 [ 1234.943253] ? lo_rw_aio+0x1470/0x1470 [ 1234.947209] blkdev_ioctl+0xc38/0x1ab6 [ 1234.951142] ? blkpg_ioctl+0xa90/0xa90 [ 1234.955041] ? find_held_lock+0x35/0x130 [ 1234.959129] ? debug_check_no_obj_freed+0x200/0x464 [ 1234.964165] ? __fget+0x340/0x540 [ 1234.967653] block_ioctl+0xee/0x130 [ 1234.971376] ? blkdev_fallocate+0x410/0x410 [ 1234.975717] do_vfs_ioctl+0xd5f/0x1380 [ 1234.979700] ? selinux_file_ioctl+0x46f/0x5e0 [ 1234.984211] ? selinux_file_ioctl+0x125/0x5e0 [ 1234.988727] ? ioctl_preallocate+0x210/0x210 [ 1234.993451] ? selinux_file_mprotect+0x620/0x620 [ 1234.998233] ? iterate_fd+0x360/0x360 [ 1235.002053] ? do_sys_open+0x31d/0x550 [ 1235.005961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1235.011515] ? security_file_ioctl+0x8d/0xc0 [ 1235.016121] ksys_ioctl+0xab/0xd0 [ 1235.019596] __x64_sys_ioctl+0x73/0xb0 [ 1235.023510] do_syscall_64+0xfd/0x620 [ 1235.027407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1235.032694] RIP: 0033:0x459757 [ 1235.035899] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1235.054811] RSP: 002b:00007efcfcb51a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1235.062671] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000459757 [ 1235.069957] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 1235.077240] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 1235.084526] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 1235.092939] R13: 00000000004c8a0f R14: 00000000004df978 R15: 0000000000000006 06:01:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x48, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:43 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:43 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f0000000100)) ioctl$PPPIOCGL2TPSTATS(r4, 0x80487436, &(0x7f0000000180)="08f5a9db1287df8ab278c4e73da592c02e16e091a35048e7218a9553558b38120af2") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r4, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0xfa, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000240)={0x5, 0x8, 0x6, 0x4}, &(0x7f00000003c0)=0x3b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680)=r5, 0x4) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f0000000200)) ptrace(0x10, r6) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000000)) ptrace$setregset(0x4205, r6, 0x200, &(0x7f00000000c0)={&(0x7f0000000000)="f5cc1eeb64b81a50b7aacf6c42ebb606", 0x10}) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000100)) r9 = syz_open_pts(r8, 0x0) dup3(r9, r7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={r6, r7, 0x0, 0x8, &(0x7f0000000200)='batadv0\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000008c0)=',){\xb9', r10}, 0x262) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r12 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r11, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r12, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r13 = socket$inet_udp(0x2, 0x2, 0x0) r14 = socket(0x15, 0x80005, 0x0) getsockopt(r14, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r14, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r15 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r15, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r16 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r17 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r17, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r18 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r18, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r19 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r19, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r20 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r20, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r17, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r11, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r20, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r16, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r21, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r22 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r15, 0x84, 0x76, &(0x7f0000000680)={r21, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r15, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r22, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r13, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r22, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:43 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)) r4 = syz_open_pts(r3, 0x0) dup3(r4, r2, 0x0) ioctl$KDSETMODE(r4, 0x4b3a, 0x100000000) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) r5 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r7, 0x0) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x400000ba, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0xee01, 0xee01, 0xee00, 0xee01, r8]) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r9, 0x40045431, &(0x7f0000000100)) syz_open_pts(r9, 0x0) sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000280)=@abs={0x3, 0x0, 0x4e20}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000ec0)="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", 0x1000}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="08000000000000000000000043c0350d74679fd1f78ee40100000001000000", @ANYRES32=r1, @ANYRES32=r9], 0x38, 0x20040880}, 0x2009004) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:43 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000000)={0x9, 0x32315258, 0x1, @stepwise={0x8e, 0xffffffff, 0x5, 0x7, 0x8, 0x9}}) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'veth0_to_hsr\x00', @ifru_settings={0x1, 0x0, @sync=0x0}}) [ 1236.944609] device bridge_slave_1 left promiscuous mode [ 1236.950184] bridge0: port 2(bridge_slave_1) entered disabled state [ 1237.004705] device bridge_slave_0 left promiscuous mode [ 1237.010188] bridge0: port 1(bridge_slave_0) entered disabled state [ 1237.169894] device hsr_slave_1 left promiscuous mode [ 1237.216591] device hsr_slave_0 left promiscuous mode [ 1237.268840] team0 (unregistering): Port device team_slave_1 removed [ 1237.279296] team0 (unregistering): Port device team_slave_0 removed [ 1237.289901] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1237.348225] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1237.415031] bond0 (unregistering): Released all slaves [ 1237.481585] IPVS: ftp: loaded support on port[0] = 21 [ 1237.562968] chnl_net:caif_netlink_parms(): no params data found [ 1237.608802] bridge0: port 1(bridge_slave_0) entered blocking state [ 1237.615402] bridge0: port 1(bridge_slave_0) entered disabled state [ 1237.622575] device bridge_slave_0 entered promiscuous mode [ 1237.630071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1237.636773] bridge0: port 2(bridge_slave_1) entered disabled state [ 1237.644226] device bridge_slave_1 entered promiscuous mode [ 1237.661823] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1237.671079] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1237.692016] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1237.699515] team0: Port device team_slave_0 added [ 1237.705667] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1237.713039] team0: Port device team_slave_1 added [ 1237.718765] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1237.731123] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1237.786418] device hsr_slave_0 entered promiscuous mode [ 1237.843745] device hsr_slave_1 entered promiscuous mode [ 1237.943831] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1237.951079] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1237.979867] bridge0: port 2(bridge_slave_1) entered blocking state [ 1237.986326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1237.992996] bridge0: port 1(bridge_slave_0) entered blocking state [ 1237.999451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1238.073785] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1238.083229] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1238.101159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1238.112028] bridge0: port 1(bridge_slave_0) entered disabled state [ 1238.122813] bridge0: port 2(bridge_slave_1) entered disabled state [ 1238.147685] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1238.154316] 8021q: adding VLAN 0 to HW filter on device team0 [ 1238.172134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1238.180406] bridge0: port 1(bridge_slave_0) entered blocking state [ 1238.186849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1238.215096] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1238.222875] bridge0: port 2(bridge_slave_1) entered blocking state [ 1238.229306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1238.238376] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1238.257983] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1238.265554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1238.283508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1238.291303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1238.307512] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1238.314199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1238.330901] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1238.342861] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1238.523797] EXT4-fs (sda1): re-mounted. Opts: 06:01:46 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:46 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000608090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) accept4$inet(r9, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000200)=0x10, 0x716c882c7c180d63) setsockopt$inet_tcp_int(r8, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x4c, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:46 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000480)='./file0\x00', 0x0, 0x10, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000200)) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$setregset(0x4205, r0, 0x200, &(0x7f00000000c0)={&(0x7f0000000000)="f5cc1eeb64b81a50b7aacf6c42ebb606", 0x10}) r1 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x400, 0x1c90c0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') write$P9_RVERSION(r2, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-'}, 0x28, 0x6) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040), 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_PRIMARY={0x8, 0xb, r5}, @IFLA_BOND_MODE={0x8, 0x1, 0x6}]}}}]}, 0x44}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000440)={'vcan0\x00', r5}) recvfrom$packet(r1, &(0x7f0000000340)=""/239, 0xef, 0x1, &(0x7f0000000440)={0x11, 0x3, r5, 0x1, 0x3, 0x6, @random="93e7d7226a73"}, 0x14) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x51481fb642e22fcc, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x1, 0x8, 0x4, 0x10001, 0x0, 0x4, 0x10500, 0x2, 0x5d, 0x9be3, 0x8, 0xb44, 0x8, 0x2, 0x5, 0x8, 0x8, 0x5, 0x10001, 0xfff, 0x6, 0x7, 0x35a, 0x84, 0x80, 0x5, 0x1, 0xfffffffffffffff7, 0x1ff, 0x7, 0x800, 0x7f, 0xfff, 0x2, 0x0, 0x9, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000140), 0x9}, 0x500, 0x1, 0x7, 0xbfdacd892ab079c9, 0xfffffffffffffffa, 0x0, 0x7fff}, r0, 0xd, r6, 0x11) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:46 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getpgid(0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000200)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) ptrace$setregset(0x4205, r1, 0x200, &(0x7f00000000c0)={&(0x7f0000000000)="f5cc1eeb64b81a50b7aacf6c42ebb606", 0x10}) prctl$PR_SET_PTRACER(0x59616d61, r1) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:46 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) inotify_init1(0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1238.710316] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:01:47 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x60, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1238.934824] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:01:47 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0x2b3b147fe3204007, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r15, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r15, 0x84, 0xa, &(0x7f0000000800)={0x74, 0x7fff, 0x3, 0x8000, 0x1, 0x4, 0x20, 0x2, 0x0}, &(0x7f0000000840)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000200)={r16, 0x4, 0x30}, &(0x7f00000005c0)=0xc) r17 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r17, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r17, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:47 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_hwaddr=@local}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4000, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'caif0\x00', {0x2, 0x4e21, @empty}}) 06:01:47 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000001c0)=0x80) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000140)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:47 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x68, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1239.302532] EXT4-fs (sda1): re-mounted. Opts: 06:01:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x3, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:47 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x501482, 0x0) setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f00000001c0), 0x4) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6c, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1239.652175] EXT4-fs (sda1): re-mounted. Opts: [ 1239.749094] EXT4-fs (sda1): re-mounted. Opts: 06:01:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:48 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x10, &(0x7f00000039c0)=0xfffffffffffffffc, 0xfffffe26) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r16, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r17 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r18 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r18, 0x40045431, &(0x7f0000000100)) r19 = syz_open_pts(r18, 0x0) dup3(r19, r17, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r19, 0x40106614, &(0x7f00000001c0)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x74, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1240.191336] EXT4-fs (sda1): re-mounted. Opts: 06:01:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000200)) ptrace(0x10, r3) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000000)) ptrace$setregset(0x4205, r3, 0x200, &(0x7f00000000c0)={&(0x7f0000000000)="f5cc1eeb64b81a50b7aacf6c42ebb606", 0x10}) r4 = syz_open_procfs(r3, &(0x7f00000000c0)='gid_map\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000100)) r7 = syz_open_pts(r6, 0x0) dup3(r7, r5, 0x0) ioctl$TIOCGPTPEER(r7, 0x5441, 0x4d) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000100)) r9 = syz_open_pts(r8, 0x0) dup3(r9, r4, 0x0) ioctl$sock_ifreq(r4, 0xcd81, &(0x7f0000000000)={'veth1\x00', @ifru_ivalue=0x8}) r10 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r10, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x5, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:48 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x2) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x82c00, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setownex(r3, 0xf, &(0x7f0000000200)={0x1, r4}) r5 = syz_open_pts(r2, 0x0) dup3(r5, r1, 0x0) recvfrom$llc(r1, &(0x7f0000000140)=""/18, 0x12, 0x0, &(0x7f00000001c0)={0x1a, 0x307, 0xc28, 0xa91, 0x20, 0x6d9, @local}, 0x10) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x3) [ 1240.645264] EXT4-fs (sda1): re-mounted. Opts: [ 1241.764087] device bridge_slave_1 left promiscuous mode [ 1241.769570] bridge0: port 2(bridge_slave_1) entered disabled state [ 1241.824175] device bridge_slave_0 left promiscuous mode [ 1241.829664] bridge0: port 1(bridge_slave_0) entered disabled state [ 1241.966910] device hsr_slave_1 left promiscuous mode [ 1242.037825] device hsr_slave_0 left promiscuous mode [ 1242.086506] team0 (unregistering): Port device team_slave_1 removed [ 1242.100257] team0 (unregistering): Port device team_slave_0 removed [ 1242.111180] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1242.161938] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1242.250889] bond0 (unregistering): Released all slaves [ 1242.292325] IPVS: ftp: loaded support on port[0] = 21 [ 1242.364735] chnl_net:caif_netlink_parms(): no params data found [ 1242.403006] bridge0: port 1(bridge_slave_0) entered blocking state [ 1242.409887] bridge0: port 1(bridge_slave_0) entered disabled state [ 1242.417440] device bridge_slave_0 entered promiscuous mode [ 1242.424777] bridge0: port 2(bridge_slave_1) entered blocking state [ 1242.431293] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.439347] device bridge_slave_1 entered promiscuous mode [ 1242.459270] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1242.468974] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1242.490310] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1242.497834] team0: Port device team_slave_0 added [ 1242.503795] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1242.511253] team0: Port device team_slave_1 added [ 1242.517342] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1242.525013] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1242.646207] device hsr_slave_0 entered promiscuous mode [ 1242.703681] device hsr_slave_1 entered promiscuous mode [ 1242.754905] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1242.762166] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1242.811675] bridge0: port 2(bridge_slave_1) entered blocking state [ 1242.818175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1242.824861] bridge0: port 1(bridge_slave_0) entered blocking state [ 1242.831224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1242.914971] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1242.927147] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1242.939942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1242.948377] bridge0: port 1(bridge_slave_0) entered disabled state [ 1242.958426] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.971546] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1242.979835] 8021q: adding VLAN 0 to HW filter on device team0 [ 1243.000088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1243.008575] bridge0: port 1(bridge_slave_0) entered blocking state [ 1243.015198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1243.036392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1243.046068] bridge0: port 2(bridge_slave_1) entered blocking state [ 1243.052712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1243.061249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1243.080007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1243.088561] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1243.096772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1243.109461] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1243.123057] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1243.129772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1243.138107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1243.172095] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1243.210699] 8021q: adding VLAN 0 to HW filter on device batadv0 06:01:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xc0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:51 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x40000000000000, 0x0, 0xfff, 0xfffffffffffffffe, 0x0, 0x50d, 0x2bc819382419cb1f, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff, 0x6}, 0x0, 0x7fffffff, 0x9, 0x6, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x100000001, 0x0, 0x2, 0x0, 0x0, 0xe3, 0x0, 0x1f}) syz_open_pts(r1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup3(r3, r0, 0x0) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000200)) ptrace(0x10, r4) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000000)) ptrace$setregset(0x4205, r4, 0x200, &(0x7f00000000c0)={&(0x7f0000000000)="f5cc1eeb64b81a50b7aacf6c42ebb606", 0x10}) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x1, 0x2, 0x2, 0x101, r4}) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000100)) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r8 = syz_open_pts(r7, 0x8000) dup3(r8, r5, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r5, 0x40046411, &(0x7f00000001c0)=0x100000001) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:51 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000b00)=ANY=[@ANYBLOB="ff000600090805006956a61c683db9f4d15744b9a9353b2b62303172b87ab18d40fd443e24ae3afa5156c3faf7c3f5e1000411fd9d2507096a992a92c079ea9cdba1d68a725fb1aaaa40275a2280b4bd91ee3ba6655b41215ee206137ef4b08263c9d60af3b05141553b2ee974c768c6fcdc9ffa0700"/134], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='\xb6l\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fce2298b25ec572ad9069ac3ee7b2e05cb47017e1de3cbeb9c501a602921697873238a4f6f461527fa1b574fb94d4fd3977580beb869c52f861a72f6d379f9e497f8e27d8412cffa394255060a9533f1efaae90c29838abc33fd2ac3b801da5582e1cf23a4153c64ea28b754832a3"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000000001000600000000000000010000800000000044640000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000007f000200000000002360e5fb7e6ad816f4f88eab684ba66cdd0df38905a42b8c9963d479f2fe7f088827a4da7d0ffaec1dd9d103291ae12272fdbcdb30bdf89feb65c045908e04a70000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffffffff0000000042f60000000000003464000000d6a08337eaf89b279aeef9d5637248b2a2bd6ace698815c1e1d62d88edcb7c0197dff80b41b43470c07947d6aaf3fdb0aceb338a0852dbb01101fa65e7af2988fdb9f5e13faed63a5502a7488da102e3db8f2e46b6cdf40e0bccf5fc0663661cc18f75baff5c400896ada2c5034c24258f277a62bbb0ba0bb8dd0bc6e4ae20ef"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x25}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:51 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000180)={'bcsf0\x00', @ifru_ivalue=0xfffffffffffffff8}) [ 1243.722350] EXT4-fs (sda1): re-mounted. Opts: 06:01:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x300, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:51 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x8, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x500, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:52 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x1}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x7, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0xf330f4a521e97fcb) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805008656a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff00aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e210000000072610300000000000000000000000000000000000000000000000000000000004800000000000000626174616476300000000001000000006263730000000000003d0003000900000002000000000001000600000000000000010000800000000044640000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000007f000200000000002360e5fb7e6ad816f4f88eab684ba66cdd0df38905a42b8c9963d479f2fe7f088827a4da7d0ffaec1dd9d103291ae12272fdbcdb30bdf89feb65c045908e04a7000000000000000002ac9aa20000000000000000000000000000000000000000000000000800000000000000ffffffff0000000042f60000000000003464000000d6a08337eaf89b279aeef9d5637248b2a2bd6ace698815c1e1d62d88edcb7c0197dff80b41b43470c07947d6aaf3fdb0aceb338a0852dbb01101fa65e7af2988fdb9f5e13faed63a5502a7488da102e3db8f2e46b6cdf40e0bccf5fc0663661cc18f75baff5c400896ada2c5034c24258f277a62bbb0ba0bb8dd0bc6e4ae20ef00000000000000"]}, 0x51f) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@pppoe={0x18, 0x0, {0x3, @empty, 'rose0\x00'}}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x10, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:52 executing program 0: socket$inet6(0xa, 0x6, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000140)={0x1, 0x3}) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:52 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x142) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000040)={0x8004, 0x2287fe6524be026e, 0x1, 0x1000, &(0x7f0000fff000/0x1000)=nil}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000500)='/dev/snapshot\x00', 0x1, 0x0) accept4$bt_l2cap(r2, &(0x7f0000000540), &(0x7f0000000580)=0xe, 0x80800) 06:01:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x600, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:52 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1244.736976] EXT4-fs (sda1): re-mounted. Opts: 06:01:52 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2, &(0x7f0000000280)="0af9ff0004000088a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x3, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt(0xffffffffffffffff, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYBLOB="ff000605006956a6dc3126ee655f225a216f09df1f63d041032062303072b87ab18d40fd443e2fae1cc3f5f000"/54], 0x0) r7 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r8 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r10, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r11 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r9, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r12, @ANYBLOB="afa3d803c321470130f3dc325ec572a59069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r13, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r14 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000680)={r13, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r7, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r14, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000200)=0x8f, 0x176) ioctl(r14, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@llc={0x1a, 0x21b, 0x20000000000008, 0x6, 0x473, 0x9, @dev={[], 0x15}}, 0x80, 0x0, 0x0, &(0x7f0000000040), 0x3a5}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x48, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x700, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:53 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x508, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1003, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000140)={0x6, 0x1edfba5553062962, 0x1, 0x80000000, '\x00', 0x5}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)) r4 = syz_open_pts(r3, 0x0) dup3(r4, r2, 0x0) sendto(r2, &(0x7f0000000ec0)="0de4f7db04c24a86b790551924b31088f386df01262a16b801e674559e5757af15e30a1cf39322542c1ef448614f39b36bb7d7c8f240a5e32e32c8f518c788f16b9684059d87608442265cd5f555b37bd07f3f0dd4a4ad1e33782d3fc3436354df6f4b1fc37a53b6a87534e9b7f4ce1e8fdf1c9b7a24be8658226f2d6c46b15d5d00dacfe64c00f0628391d531bfdb053d91a5a601e11f9c1266e76b032dbfffbbb9f63cacbde97a830a2c85aeb3f3c5d780e898f1ea29e95fc801693b75575ab62ae7a2cc54b33ff12aeb12b20297e0ea3461749d6f88fb1bb570e0fd56a440448250724bf2b454a9c3b714064adf90fe588d0c1933029e66b93c6d17a84557e076eac25d0751492cbc1fa0afab3fd0588fe9f17c49c64e69597c8f20d04573b13922cc22c1e8d50c80807dbbaac771ccbc1fbfb5c5b502b2d53aca895bf50032a5a497b576302b1be3018c2763bb7bcd80c175deb1af2ecf3e5e5bd2a83d9ef4bfd395e3309910a61ca044acffd59b94f3e3d24f71fcce34ea2e63f89c0e299834dac5eda736399eaae59c104616f4692179b6aea72c671340c15262dc0a62861f100bc785b4c1242a598f99c5cabb26eb5965e8caf57288b73418b0905f34a91575803c8a075a98c266f9a9aa80f09b6bd393d8b8d8a65508e9ed4c67a0be9a55eab3f8890ca213e54a16331623f33602c3d037683a98e539cb8f89f5cf8000eef3a2d7b241d47884e7971224df8a3aebb3fd8ec5bc37963254cd6310e908078374b6e9e216f13d62a0cb3aa554f1bea199a7889dd8cc0e42da10e9745789b9f5c754420d4a5a9aab182515d86e4d6d39c47a17efd040b8225d88f0d9f3c960c55bc537293867bf2558820fe3313024d3c0f9bff9e89bf71b713f9c04afea7e9f0fd76571c528ed28338fb3325079e06ffccd06928b646c669ffe649838818bee26173e0e2b6f8d7015b7a81558dae1c62ce5af74a3e83a52691dd3fd1aaa2a720a1de03c819de7bca1eb0c7fafef13c5b1efa4fa115f7c07efd33f5b08def1753abadfd9a93b29e7dd1aac286dde5040fceb9418251e08fa514d43f216dfac2d3e6f8e21e2bea311bf7a427cbba701e987e48d009ba09c79ee220c6a7f96b4218d80524204ad61814407cffaf0d43c68f7112571dd32a7ad429e22dfe698730f13e5993df18290c657e15bc80456e14701e18844acb013d7192fce5a2f4ec358fc21816938fcfdd7c20c342faa4c5849b7d80ffe77a1c13bb478535556e269479fe3baa8cff41c78982de963767ca69e5ec49c1a7378fe27f3bceba932821f8407b14336bea7486df3c7621f1405024c6305c9ed3dfbaeebcbe760e5b34c99b45b101549854a05da97161da899ae9d0e445a8edc0ab688162099881aa84723ee8b9e96db34af0a62a4ff19565072ff6a2ce8610c40bc7bea3940f7b68af3fd604bc37049da4a486289eb120ead3dcb0692273a83936b76d7296f0ba2b164bc7669c36f945a3363037397cd8d5a1a0188b566382be859b54a6e916e6fb98b2a261cef9b3214f118f1c476b446d21d9a37e04b4dd4d5d6bb5c55e0d72a490544d5e9d893c9192534fa6e2c54aee4693a76568be63da0cf2f51a5261d1e37b1cfcc00a0bb26f0b4046107ef1ea746158302ef28819374dd37f68882a140ed2f716ef2a0d2e6740d24164d099559f6a0bce3ff1ea1137677c9a5f6e3a056e974cb5d129b2e0154fc20066edaca9116d81f5aad1b0afee47d65771a331bcc92184dade5a9cb5404f7dfbca5d4cbd89488b71fbb91312240a016aa61099851d7db6025826af78c7bce2d90a2e2554f916cb92a46fb381432149db2805de82cb9d8afd6237263bc217b2817c336efba91c52a6d650ebd81f4d73b52d6b2f3d56b4b903c42943fe166114093651ab9dc4e09cb2612b107c1511deb693e0768cb257e4ad9a66e6d309379e87bd6985c92d24aeecbba77d92f69b69f221d7a96d444998bc8f6a8ceebea0250745875200ef27419c6de26119858976247ff2ace0540ba2497e78966721505a38ed8e44aa697cf7773507be57f9788e53d461b63c4a8baf8b9058088da10744e8cb22a134aa241be8236229aa6a31638d57fc23021747f20bf3e68c3d9f200f5fda40397914839b6ab7181c43ecc031fd278917dfd5bb30dbed1fec7efca880d0971c428ac57d928c42a4b5834872abaf97802c8099b2b21153a5b45bd5e37ef34c89e0582db56e7f330b14f6e72a99148b04b519701b5b3b50cfceaf130ff3adf52ef0843476bb6bc24a3a1809ee1fc7ad35cd144cf4b6a17e983fae10b997f755451151608f185dd00e1f2009b095112eae13a0ef68fc1588f2a0c3462ccb912baea08f0ee4522402f2fd3b6459f4dbf06c7e5da991d9a36b679582689718926bdb470a022daf104e3355d3c49d161f96eaf0f94acdca4614be444fea4cc8253699ac9482de2304f45ecbd29a940c5f4b3cf484bfc720ebe22f1488a5aa77740c49d6a7636f7820fe8bffc38b72af77e7f464484c1baa7a94b4468394cf0196ddb0dea739e18970cdd72123e66942d04ed111a112022373b60594dad31a83029d44394dee2bb85cf31445a293bc3af0967e36a989a2804cd9dfb0653665165371c7c23e520b9d56f463e1f2a9147a99ce8eb40e01ea89038261c301d4fcb719f5c29ac62b08975b11322972df6a94c00d23d7ecfefb7c7a850639d137bc3211448da9cccd320fd27674cab000b9d1f8fc4adc0743c7e8264d56e1039c88533b2d9bfa333e36543ade7be3aa94375dbc72e257f961f6db498725065f1b5314c3891cb42e1df9ba75fd82513adb543eea0ceff6f0ee2b9ab27f713d7a72bf9b51e69d3dd3bbf1638ece43489a122bdee776a92a3aa315a8f6a984e32113e5bb8d063caeddb53382df82431c3ffc1322d60883fd2922e97d19c8d654c23b2b521e02e015cbd53dea46d5dfafff0c36a7dafec0464085e027bc437f51e4d2a31c1530dfe75b3d151d4754e613ad2578523dec89a7a7e992e78a66d0e2de9b29f511a60119798ba476dbb837e51b7470ac5e9a12532488dd19fb00c58e0f565e6dd159ed8c05925d6abf75a9fd20fbc0d0cd25f99729d8287d60a23513edcff467d727fcdf108dff33ba60876efaf1ac500060fab04737e4e7d2d30e29f4643c3eb2f18443c8787a44ab47a645001fa0644371accda3971a0f43689e459767a6e55a98bd6f05d5404f9da56cbca1c4778b8bbe54eae77585a4cef663d5a1312abe4ac2bdb33c585235e729ff68a7be39f542780725e99b7f89979dc683068cb448597fb528800755ee616884a8ff66378a9d4af774c582f629dc75ea5855a983aaa414d577b9affe0116383332dd57721af409a5283366d79fb20bab79b87c271f2ffecb20e1896303b55197f4c947ee0a33f2c7a23b8baf182cd15d02c82607734992c3503150313a0d0f467811bb914f045f809705b8229a348f260f338602145294e827f925757f61c48427bd024a9e2665dc0ae10b16f2b61c338933e7b8c645d30bb0db5fcf4ff904fc70f96ef8fc3be6d97132b3f4e4d9a181778ccc51c1a8d11b699ae5a6ec75b8335e5651499fe1a574c4b2ddcd669ce49670493a27b2b927b888192dc9b0733ada0e79d89ed7312d1ab7153323abbd1c205e740ad2fd8e6f2c2543e345f57719ef016e5abbae454966a616bb92086dd2a5ff2baf0189613a88db20c6f684f82fbe846a71787b115d4f001acf58f4aaab2b6456b312ff1120b882dd66e9a7120517eb65db9f0d17b3fbe453caf68ccc8bb66a2ff4a9fc0d240893877975e5fdfc714c1efeddd27209d903e61177fd7d8c512b4ac4c7a68fd446ebc42ac569ff2aa2d324abe84000dc3c80118c1cffe642b762c2e7075c44277f55868571e2bafe014f0db494075068263039a869ba40ce82fbd747ccca462962df03902ea45a739ea2734dad1ee7a2683541b353078ebacc211e5ab910c7ee848542a20177d714439161f58a2823b3d7ffc00e05ac938164de62a61741d8c570e33f9f87dee36361307e246f267f2b2ccfbc5de2896e056f76690540164702b87c8b56fb2fbdca8f47c3a33a8d37c6256040a67bb57b5bf56fc5953fc33ddf007b687d05401eaa03d32280b855771856921e5ce08134e8981e682a13f88cccec8beba9b967f54124a5c0678f47370498de267d93525be854c6e5a29971f7577182b3d4229e35b0cf3e82bcdfcba024fc7a42abca8765aa945b4f5bbb184ecc0d2e19848fc2517e4780aaa0e14b4f0bd9bae1259d9eb40800c9650527dd9a23c857807ae276c99736a4a76896c119d6b07887263a53238082c2287561ffb3dfca616ab722c4dc02e2893358e8ef8693e9659069a4c7940a9d87892abbdffb2f74b34f8f5e0ea18ff25e3d5ba24328b236a3a72474517074daee0ccfe617f79a84c7a5633a6841a153b5c7b2a531cbbbc76b4a48bd9814444ad871eb55f3b4e05e3e8e1a66fef0555a6f48546c60e0588625be9c18c25c4f0887de058e36c4934d9a75645267ab23e9f66913c86931e36303378da2174a9b405054c1f0e071bfdfb9951cf28b721a6cbf486e1dbadf36579c521cd8dd39511525f195bbf0fc58a7d9d13c52dc8c7d860a26ee68c2dc3aa050e910014c4e17d8677544acfe6f579f6124570b8b9b35541fb832e7a9d77337ae78f86850032ac271697f0f16a560b284935c80398dd653b77e10c562dbf06febed77b709078365b5603ab52d1705f96feb024c5fc5a549ab3c1d221c38115fbe6bb949aecd347bd9a60a25f87c9b813a33c5d8ded51f274e2ba9eeddba6fdfc67b086ab9131dd2720080d36d1040411a0d4bc084ac67e5bcde0c0379a79ce01e4c83b6fa705523bd155fa64526514bb5b5366b0c25cd8f76ac4d2bfd51e16309e867fdc06d0a9a530bb93a0f6bea6fee5a32ad6fe1d9e303f38f5f28b69710106010c26dd7677a324478215b99dfb1c019575ce7774d3447a6a9fb231942fac636c1bd87c5149bee344ad6e59fb8b69c0aa277f69d72bda8def48bd3f2f825c5dec7a96763e00c39b251b4def15905fb829b969e00d259553e493abf4b91db05206dd3f5d42231a3032929042ee91e79607d3a08874f04105651760438f0b0da8588a10067c66eaea063eacc400078d0294e30033603d923323cdb4fdf2d0418607e290c5f57e15fc39da992ad84c13a8daddd46cc05a715dae9605a00f9a5d173b213648f49ef6ed799dbfe991c403fad9a92588a72b36118c7a2def75d04e2ea3987eb70f0ab8c4692651387e6b9186d12d04f71c0b06205b0eaf5cb3355aa3717cab1b42cb264ef5983041904d5ae3ad70fc2b331d6c296b0d911a41005605c3219a9368fc5124d34e0bfc666dd703a992968bbbf1af501fca418d8f2bbfe19acb9c291ddd3126acfe50d83c2b1cad2c1432b81d0af54a7d01c841558f558085b68cfff25f84aeaea4a2717e37bbc41734a60635a3c68817bfbf54edf4a079971b988106fb68955035fe55bd851e53191144c45bbe626e1980dc23f87aee1d8919e432e087542a2414370a091a1a774f0a7b6d2b30f5f6088f085830d70beb234b6d4da21bb1740801677500a6980e3b001d909d8e52b7bf9b6141ff8caabe8e7495f9d064c597b3eb01f6a889748b8c3185cfa984ed73635601f7367bd2420d7dbe35d4442c0e2d92dfb360c4d52f6079c771999d98070f2c32aa109132221f1d17017e6feec223d05ff72ffd5ca96c73e3f76b606616f692242a12960b5e828599", 0x1000, 0x8, &(0x7f0000000280)=@tipc=@name={0x1e, 0x2, 0x1, {{0x60, 0x3}, 0x3}}, 0x80) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:53 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r14 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r15 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r15, 0x40045431, &(0x7f0000000100)) r16 = syz_open_pts(r15, 0x0) dup3(r16, r14, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28400010}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r14, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f69ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000001200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657400000000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000002726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000000001000600000000000000010000800000000044640000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000007f000200000000002360e5fb7e6ad816f4f88eab684ba66cdd0df38905a42b8c9963d479f2fe7f088827a4da7d0ffaec1dd9d103291ae12272fdbcdb30bdf89feb65c045908e04a70000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffffffff0000000042f60000000000003464000000d6a08337eaf89b279aeef9d5637248b2a2bd6ace698815c1e1d62d88edcb7c0197dff80b41b43470c07947d6aaf3fdb0aceb338a0852dbb01101fa65e7af2988fdb9f5e13faed63a5502a7488da102e3db8f2e46b6cdf40e0bccf5fc0663661cc18f75baff5c400896ada2c5034c24258f277a62bbb0ba0bb8dd0bc6e4ae20efda213103ec6cc1de2c80d3629ad7b69e208a60d388e7e7812173d87325bfb33044564bf12e85cdf8b90e048ba2126292d0424ebf099bff34188b5f0dc07ac1714742b17a160fd88036e1f4c49d2251f44a4eb0551767de99d01dda7d12e4f3067c705f31a7323371da57f7bd39a71d90274c87d90fba2b9fca4023ea0b90fddc7f83e2054f1023fb0770b9"]}, 0x5ac) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r17, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r18 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r17, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r18, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r18, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:53 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4841, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)) r5 = syz_open_pts(r4, 0x0) dup3(r5, r3, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r2, 0x200, 0x0, 0xffffffffffffffff, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x1b, 0x0, @udp='udp:syz2\x00'}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x300, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000100)) r8 = syz_open_pts(r7, 0x0) dup3(r8, r6, 0x0) fcntl$F_GET_FILE_RW_HINT(r8, 0x40d, &(0x7f0000000200)) [ 1245.292350] EXT4-fs (sda1): re-mounted. Opts: 06:01:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4c, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:53 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x101180, 0x4) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f00000000c0)={0x1, 0x7fffffff}, 0x2) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x20, &(0x7f0000000080)=0x4) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xfffffffffffffff9) 06:01:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xe11, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:53 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:depmod_exec_t:s0\x00', 0x23, 0xeed17a6f50cbb595) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1245.601062] EXT4-fs (sda1): re-mounted. Opts: [ 1245.629741] EXT4-fs (sda1): re-mounted. Opts: 06:01:53 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="28000000290300003900000027020201594a87ccfe800000000000005900000008000000"], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1245.685541] EXT4-fs (sda1): re-mounted. Opts: 06:01:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x110e, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x68, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:54 executing program 0: pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000280)={0x0, @bt={0x0, 0x8000000, 0x1, 0x2, 0x1f, 0x7af2, 0x100, 0x4, 0x6000000000000000, 0x0, 0x9, 0x6, 0x101, 0xf858, 0x14, 0x1b}}) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x0, @rand_addr=0xfffffffffffffffc}, {0x2, 0x0, @local}, {0x2, 0x4e21, @remote}}) 06:01:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1f00, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1246.228492] EXT4-fs (sda1): re-mounted. Opts: 06:01:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6c, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:54 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x1}, 0xfff}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e23, 0x9, @mcast2, 0x9e04}], 0x58) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000040)) 06:01:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:54 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @null=' \x00'}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0xffffff97, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYBLOB="1bcaf0464bccf877d2143e83", @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f0000001240)=ANY=[@ANYBLOB="a353b50e5b147c2e5cf9f2dcdb32d1f2828e582a10b055bd5db9a247574e6374a303ace33c5c49f411d46f1d498e233fe42e7b95b94da792d443e7095578113a0496e1e080c10eaac40a72ed0a4d37fb4c50f838d0bd00074f5439606cd26a9b1234c1963dc600b4996bff83fecb2881b8f8361e36231ece464cb265e2f7f73c86fce7942b47168a8b2f54897ec5c2e5e526d8", @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3ea5dd7f53d3d671de94ff59cd9581e017157420e60dffa37016551c0f06670181e087e97be85734d0eaa21ea09e1f057b46f0f3c954404f60774a3811df44153420e198c131aaaefc511b2571412a7ef89220dce6c4b48f80f1fb9765c402dcaec7ca54698b8002bd1c418aada81a"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000000001000600000000000000010000800000000044640000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000007f000200000000002360e5fb7e6ad816f4f88eab684ba66cdd0df38905a42b8c9963d479f2fe7f088827a4da7d0ffaec1dd9d103291ae12272fdbcdb30bdf89feb65c045908e04a70000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffffffff0000000042f60000000000003464000000d6a08337eaf89b279aeef9d5637248b2a2bd6ace698815c1e1d62d88edcb7c0197dff80b41b43470c07947d6aaf3fdb0aceb338a0852dbb01101fa65e7af2988fdb9f5e13faed63a5502a7488da102e3db8f2e46b6cdf40e0bccf5fc0663661cc18f75baff5c400896ada2c5034c24258f277a62bbb0ba0bb8dd0bc6e4ae20ef"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r16, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r17 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r17, 0x84, 0x72, &(0x7f0000000080)={r18}, 0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r18}, 0x8) r19 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r19, 0x84, 0x72, &(0x7f0000000080)={r20}, 0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r20}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r15, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYRES32=r20, @ANYBLOB="38000020cd57b60026dd81839d22de87a1a40dce0e207999d7b76d47371cdbdf548dcdbdd1bb2449070b49d8e614307ee6abff5625edc180944a12c9"], &(0x7f0000000280)=0x40) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r16, 0x84, 0x76, &(0x7f00000001c0)={r21, 0x209}, &(0x7f00000006c0)=0xffffffffffffffc0) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1246.565156] device bridge_slave_1 left promiscuous mode [ 1246.570859] bridge0: port 2(bridge_slave_1) entered disabled state [ 1246.642397] EXT4-fs (sda1): re-mounted. Opts: [ 1246.670512] device bridge_slave_0 left promiscuous mode [ 1246.676510] bridge0: port 1(bridge_slave_0) entered disabled state [ 1246.712096] EXT4-fs (sda1): re-mounted. Opts: 06:01:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2200, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x74, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:55 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') pipe(&(0x7f0000000480)={0xffffffffffffffff}) fchmod(r0, 0x40) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000380)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2c00, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1247.064250] device hsr_slave_1 left promiscuous mode [ 1247.115558] EXT4-fs (sda1): re-mounted. Opts: [ 1247.142408] device hsr_slave_0 left promiscuous mode [ 1247.199268] team0 (unregistering): Port device team_slave_1 removed [ 1247.279506] team0 (unregistering): Port device team_slave_0 removed 06:01:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7a, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1247.363992] bond0 (unregistering): Releasing backup interface bond_slave_1 06:01:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x3f00, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1247.448928] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1247.726095] bond0 (unregistering): Released all slaves 06:01:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x300, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1249.319692] IPVS: ftp: loaded support on port[0] = 21 [ 1249.399186] chnl_net:caif_netlink_parms(): no params data found [ 1249.433717] bridge0: port 1(bridge_slave_0) entered blocking state [ 1249.440155] bridge0: port 1(bridge_slave_0) entered disabled state [ 1249.447701] device bridge_slave_0 entered promiscuous mode [ 1249.455186] bridge0: port 2(bridge_slave_1) entered blocking state [ 1249.461622] bridge0: port 2(bridge_slave_1) entered disabled state [ 1249.469173] device bridge_slave_1 entered promiscuous mode [ 1249.486862] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1249.496632] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1249.515108] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1249.522750] team0: Port device team_slave_0 added [ 1249.528631] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1249.536303] team0: Port device team_slave_1 added [ 1249.541704] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1249.549269] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1249.616684] device hsr_slave_0 entered promiscuous mode [ 1249.653800] device hsr_slave_1 entered promiscuous mode [ 1249.694064] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1249.701083] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1249.722462] bridge0: port 2(bridge_slave_1) entered blocking state [ 1249.728885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1249.735538] bridge0: port 1(bridge_slave_0) entered blocking state [ 1249.741890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1249.777876] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1249.784678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1249.793027] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1249.802045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1249.813978] bridge0: port 1(bridge_slave_0) entered disabled state [ 1249.820718] bridge0: port 2(bridge_slave_1) entered disabled state [ 1249.828169] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1249.839250] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1249.845721] 8021q: adding VLAN 0 to HW filter on device team0 [ 1249.855543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1249.864045] bridge0: port 1(bridge_slave_0) entered blocking state [ 1249.870409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1249.880534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1249.889103] bridge0: port 2(bridge_slave_1) entered blocking state [ 1249.895524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1249.915596] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1249.923602] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1249.942757] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1249.951275] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1249.959088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1249.969944] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1249.976885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1249.992431] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1250.004050] 8021q: adding VLAN 0 to HW filter on device batadv0 06:01:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x4000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1250.114653] EXT4-fs: 4 callbacks suppressed [ 1250.114709] EXT4-fs (sda1): re-mounted. Opts: 06:01:58 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2800000000000000290000003900000027020201594a87ccfe800000000000005900000000000000b28f584fc346fa7348bcbd00de83c282b349bc573e91903950b3447a84ee5879ae997958c7a614b4dbfffea323164278"], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:58 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = accept4$bt_l2cap(r1, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x80c00) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)) r5 = syz_open_pts(r4, 0x0) dup3(r5, r3, 0x0) sendfile(r1, r5, &(0x7f0000000100), 0x1) open_by_handle_at(r2, &(0x7f0000000080)={0x60, 0x8a6f, "167a73c14518df5f439625f9e1e0479d58100db4886570f30a06bd1bd415fcffb264a8887d5268f94c9212bd8775efd7631e73968ea4a2bbf5e7b1f2c4f7292536c3eb9bcd20011890b34ec5fde211999b145f5f3401a220"}, 0xab5d8de6b8861e22) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:58 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)=""/158) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x500, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1250.261318] EXT4-fs (sda1): re-mounted. Opts: 06:01:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x4800, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1250.352242] EXT4-fs (sda1): re-mounted. Opts: 06:01:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x600, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:58 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x15, 0x57, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x97, 0x209e1e, 0x3, 0x1}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f0000000240), &(0x7f0000000140)=""/130}, 0x18) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000004c0)="19da92a1faeeca4b0aaf3eb8aa97984718c6a0fd6472b0c69c0f9c8014e27fb30db9a8c091b66e82e8c7e283daa8a1224d9e11b63e20c476fd4daa9a78d0714f361bd3ae97a19e679e6edbec5cd36ff5230fedd93b3ff69581a8c72904cd1f04f74d352b86fa5e52d9b659d75846f91bdd8e47498c17489ffcea87f880f490a55ba81a99dea4", 0x86) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000100)) r6 = syz_open_pts(r5, 0x0) dup3(r6, r4, 0x0) accept4$bt_l2cap(r0, &(0x7f0000000280), &(0x7f00000002c0)=0x3ed345d97502df7c, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r10, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 06:01:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1250.750185] EXT4-fs (sda1): re-mounted. Opts: 06:01:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x4c00, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:58 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = accept$inet(r0, 0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000001100)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001000)=[{{&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/76, 0x4c}, {&(0x7f0000000380)=""/92, 0x5c}, {&(0x7f0000000400)=""/107, 0x6b}, {&(0x7f0000000480)=""/219, 0xdb}], 0x4}, 0x7}, {{&(0x7f0000000580)=@rc, 0x80, &(0x7f0000000780)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/96, 0x60}], 0x2}, 0x9}, {{&(0x7f00000007c0)=@l2, 0x80, &(0x7f0000000900)=[{&(0x7f0000000840)=""/151, 0x97}], 0x1}, 0xffff}, {{&(0x7f0000000940)=@nfc, 0x80, &(0x7f0000000f40)=[{&(0x7f00000009c0)=""/127, 0x7f}, {&(0x7f0000000a40)=""/134, 0x86}, {&(0x7f0000000b00)=""/17, 0x11}, {&(0x7f0000000b40)=""/234, 0xea}, {&(0x7f0000000c40)=""/162, 0xa2}, {&(0x7f0000000ec0)=""/119, 0x77}, {&(0x7f0000000e40)=""/64, 0x40}], 0x7, &(0x7f0000000fc0)=""/40, 0x28}, 0xbe7}], 0x4, 0x40002000, &(0x7f0000001140)={r2, r3+30000000}) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001240)={{{@in=@loopback, @in6=@dev={0xfe, 0x80, [], 0xb}, 0x4e22, 0x0, 0x4e23, 0x8001, 0x2, 0x80, 0x20, 0x1d, r4, r5}, {0x100000000, 0x1, 0x1, 0xd3, 0x10001, 0x2, 0xfffffffffffffff8, 0x3}, {0xff, 0xffff, 0x5, 0x2}, 0x400, 0x6e6bb1, 0x3, 0x0, 0x3, 0x1}, {{@in=@multicast2, 0x4d5, 0x3c}, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x12}, 0x3502, 0x2, 0x3, 0xc7, 0x2, 0x7, 0x1}}, 0xe8) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001340)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$KVM_GET_REG_LIST(r6, 0xc008aeb0, &(0x7f0000001380)={0x5, [0x40, 0x5, 0x100000001, 0x7, 0x1000]}) [ 1250.820332] EXT4-fs (sda1): re-mounted. Opts: 06:01:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x700, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1250.934773] device bridge_slave_1 left promiscuous mode [ 1250.963577] bridge0: port 2(bridge_slave_1) entered disabled state 06:01:59 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x20, 0x400) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)) r4 = syz_open_pts(r3, 0x0) dup3(r4, r2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x9f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @in6={0xa, 0x4e22, 0x800, @empty, 0x7c}}}, 0x90) [ 1251.076192] device bridge_slave_0 left promiscuous mode [ 1251.082333] bridge0: port 1(bridge_slave_0) entered disabled state 06:01:59 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1251.203996] EXT4-fs (sda1): re-mounted. Opts: [ 1251.306607] EXT4-fs (sda1): re-mounted. Opts: [ 1251.394568] device hsr_slave_1 left promiscuous mode 06:01:59 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @null=' \x00'}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(r5, 0x541b, &(0x7f0000000100)) ioctl$PPPIOCGL2TPSTATS(r5, 0x80487436, &(0x7f0000000180)="08f5a9db1287df8ab278c4e73da592c02e16e091a35048e7218a9553558b38120af2") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r5, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0xfa, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000240)={0x5, 0x8, 0x6, 0x4}, &(0x7f00000003c0)=0x3b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x1}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680)=r6, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r4, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', r6}, 0xffffffffffffff29) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r7, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r8, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = socket(0x15, 0x80005, 0x0) getsockopt(r10, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r10, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r11 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r11, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r12 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r15 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r15, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r16 = socket$inet_smc(0x2b, 0x1, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r13, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r7, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r16, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r12, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r17, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r18 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r11, 0x84, 0x76, &(0x7f0000000680)={r17, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r11, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r18, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r9, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r18, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:01:59 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6800, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:01:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xe11, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1251.478685] device hsr_slave_0 left promiscuous mode [ 1251.528724] team0 (unregistering): Port device team_slave_1 removed [ 1251.585939] team0 (unregistering): Port device team_slave_0 removed [ 1251.665193] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1251.751525] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1251.802268] EXT4-fs (sda1): re-mounted. Opts: 06:01:59 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6c00, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x110e, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:00 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000200)) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_QUANTUM={0x8}]}}]}, 0x38}}, 0x0) ptrace$setregset(0x4205, r1, 0x200, &(0x7f00000000c0)={&(0x7f0000000000)="f5cc1eeb64b81a50b7aacf6c42ebb606", 0x10}) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f0000000200)) ptrace(0x10, r6) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000000)) ptrace$setregset(0x4205, r6, 0x200, &(0x7f00000000c0)={&(0x7f0000000000)="f5cc1eeb64b81a50b7aacf6c42ebb606", 0x10}) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f0000000200)) ptrace(0x10, r7) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000000)) ptrace$setregset(0x4205, r7, 0x200, &(0x7f00000000c0)={&(0x7f0000000000)="f5cc1eeb64b81a50b7aacf6c42ebb606", 0x10}) r8 = syz_open_procfs(r7, &(0x7f0000000680)='\aOP\xca2\x81e\xa2\x00\x00\x00\x00') r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r9, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) r10 = syz_open_pts(r9, 0x0) dup3(r10, r8, 0x0) [ 1252.069754] bond0 (unregistering): Released all slaves [ 1252.161999] EXT4-fs (sda1): re-mounted. Opts: [ 1252.249396] EXT4-fs (sda1): re-mounted. Opts: [ 1253.970141] IPVS: ftp: loaded support on port[0] = 21 [ 1254.042251] chnl_net:caif_netlink_parms(): no params data found [ 1254.080264] bridge0: port 1(bridge_slave_0) entered blocking state [ 1254.087625] bridge0: port 1(bridge_slave_0) entered disabled state [ 1254.095237] device bridge_slave_0 entered promiscuous mode [ 1254.103225] bridge0: port 2(bridge_slave_1) entered blocking state [ 1254.111079] bridge0: port 2(bridge_slave_1) entered disabled state [ 1254.119319] device bridge_slave_1 entered promiscuous mode [ 1254.138981] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1254.149667] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1254.169367] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1254.177455] team0: Port device team_slave_0 added [ 1254.184364] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1254.192754] team0: Port device team_slave_1 added [ 1254.199131] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1254.206842] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1254.266318] device hsr_slave_0 entered promiscuous mode [ 1254.303959] device hsr_slave_1 entered promiscuous mode [ 1254.343972] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1254.351116] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1254.370009] bridge0: port 2(bridge_slave_1) entered blocking state [ 1254.376425] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1254.383025] bridge0: port 1(bridge_slave_0) entered blocking state [ 1254.389635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1254.427577] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1254.434611] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1254.443136] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1254.454548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1254.462213] bridge0: port 1(bridge_slave_0) entered disabled state [ 1254.469102] bridge0: port 2(bridge_slave_1) entered disabled state [ 1254.476884] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1254.489277] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1254.495816] 8021q: adding VLAN 0 to HW filter on device team0 [ 1254.506490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1254.515049] bridge0: port 1(bridge_slave_0) entered blocking state [ 1254.521418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1254.533777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1254.541511] bridge0: port 2(bridge_slave_1) entered blocking state [ 1254.548257] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1254.564861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1254.573663] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1254.585069] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1254.600240] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1254.611367] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1254.622058] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1254.628814] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1254.637246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1254.645293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1254.659885] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1254.670941] 8021q: adding VLAN 0 to HW filter on device batadv0 06:02:02 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x7400, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1f00, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:02 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r8 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r9 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r10, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r11 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r9, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r12, @ANYBLOB="afa3d823c3218f2fceb7dcb25eae72ad9069ac3e7d7ba5d36f1f5eb5872eddc9724b9d369cbe09d884b6b579"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) r14 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r14, 0x84, 0x72, &(0x7f0000000080)={r15}, 0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r15}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r15, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r16 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000680)={r13, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r16, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r16, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2810000000000000ccfe8000000000000059f90096d46a0c85d0f7ab"], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:02 executing program 3: ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x10000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r2, 0x105, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x2000, 0x0, @l2={'eth', 0x3a, '\nxcan1\x00'}}}}}, 0x34}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x10080, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r2, 0x600, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x3, @link='syz0\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x18}, 0x4000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)) r5 = syz_open_pts(r4, 0x0) dup3(r5, r3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000240)={0x1, 0xfffffffffffffbff, 0xfffffffffffffffc, 'queue0\x00', 0x252}) 06:02:02 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000140)={0x3, 0x2, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1254.866305] Enabling of bearer rejected, failed to enable media 06:02:03 executing program 0: getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000002000)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0x1008) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x20d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) bind$bt_rfcomm(r0, &(0x7f00000001c0)={0x1f, {0x7, 0x0, 0x5, 0x9, 0x5}, 0x34}, 0xa) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1254.960572] Enabling of bearer rejected, failed to enable media 06:02:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a00, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:03 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r6, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = socket(0x15, 0x80005, 0x0) getsockopt(r8, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYBLOB="ff000600090805007b56a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24aea9009994e9e842b1357ecdbd27ca3ac3f5e100042a4d1e159aaa"], 0x0) r9 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r9, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r14 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r14, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r15 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r15, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRES16, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r5, @ANYRES64=0x0, @ANYRES16=r4, @ANYRES16=r11, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r15, @ANYRES16=r15]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r16, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r17 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r9, 0x84, 0x76, &(0x7f0000000680)={r16, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r9, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r17, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r7, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r17, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x891a, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)) r5 = syz_open_pts(r4, 0x0) dup3(r5, r3, 0x0) r6 = syz_open_pts(r3, 0x8bff231624dce82c) dup3(r6, r1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000000)=""/223, &(0x7f0000000100)=0xdf) 06:02:03 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6(0xa, 0x5, 0x8) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000140)=0x101) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xc000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1255.423681] EXT4-fs: 2 callbacks suppressed [ 1255.423710] EXT4-fs (sda1): re-mounted. Opts: 06:02:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:03 executing program 4: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r1, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r2 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r2, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r3, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r5 = syz_open_dev$sndseq(&(0x7f0000000300)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000001840)={{0x80}, 'port0\x00', 0xffffffffffdfffff, 0x2}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) read(r5, &(0x7f0000000040)=""/164, 0x2d) socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x15, 0x80005, 0x0) getsockopt(r6, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r7 = accept$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r8 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r9, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) 06:02:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x3f00, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1255.723028] device bridge_slave_1 left promiscuous mode [ 1255.732437] bridge0: port 2(bridge_slave_1) entered disabled state 06:02:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x40000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1255.814558] device bridge_slave_0 left promiscuous mode [ 1255.820509] bridge0: port 1(bridge_slave_0) entered disabled state 06:02:03 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) r1 = msgget(0x3, 0x224) msgctl$IPC_INFO(r1, 0x3, 0x0) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000000)=""/115) r2 = msgget(0x3, 0x224) msgctl$IPC_INFO(r2, 0x3, 0x0) msgrcv(r2, &(0x7f0000000080)={0x0, ""/201}, 0xd1, 0x0, 0x1c00) [ 1255.877232] EXT4-fs (sda1): re-mounted. Opts: [ 1255.965167] EXT4-fs (sda1): re-mounted. Opts: 06:02:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1256.127085] device hsr_slave_1 left promiscuous mode [ 1256.180640] device hsr_slave_0 left promiscuous mode [ 1256.240610] team0 (unregistering): Port device team_slave_1 removed 06:02:04 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1256.312955] team0 (unregistering): Port device team_slave_0 removed [ 1256.373712] EXT4-fs (sda1): re-mounted. Opts: 06:02:04 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x84) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xfffffffffffffffb, 0x1, 0x800, 0x100000001, 0xfffffffffffffffd}, 0x14) ioctl$TIOCNOTTY(r0, 0x5422) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1256.423891] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1256.485802] bond0 (unregistering): Releasing backup interface bond_slave_0 06:02:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4800, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:04 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x100000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1256.797390] EXT4-fs (sda1): re-mounted. Opts: [ 1256.822106] bond0 (unregistering): Released all slaves [ 1256.880534] EXT4-fs (sda1): re-mounted. Opts: 06:02:05 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x40000000, 0x0, @sync=0x0}}) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='nr0\x00\x00\x04\x00\xff\xff\xff\x00') ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000000)={0x80000001, 0x5a4e, 0xffff, 0x5, 0x14, 0x5}) 06:02:05 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x4, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2800000000000000290000003900000027020201594a870000005900"/40], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1258.622101] IPVS: ftp: loaded support on port[0] = 21 [ 1258.693939] chnl_net:caif_netlink_parms(): no params data found [ 1258.729682] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.736394] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.743680] device bridge_slave_0 entered promiscuous mode [ 1258.750865] bridge0: port 2(bridge_slave_1) entered blocking state [ 1258.758363] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.765996] device bridge_slave_1 entered promiscuous mode [ 1258.785177] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1258.794917] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1258.812772] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1258.820488] team0: Port device team_slave_0 added [ 1258.826072] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1258.834005] team0: Port device team_slave_1 added [ 1258.839432] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1258.846974] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1258.915600] device hsr_slave_0 entered promiscuous mode [ 1258.985175] device hsr_slave_1 entered promiscuous mode [ 1259.024047] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1259.031039] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1259.049249] bridge0: port 2(bridge_slave_1) entered blocking state [ 1259.055720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1259.062485] bridge0: port 1(bridge_slave_0) entered blocking state [ 1259.069058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1259.105357] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1259.111468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1259.120857] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1259.131352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1259.139369] bridge0: port 1(bridge_slave_0) entered disabled state [ 1259.146822] bridge0: port 2(bridge_slave_1) entered disabled state [ 1259.154874] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1259.172567] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1259.179816] 8021q: adding VLAN 0 to HW filter on device team0 [ 1259.190388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1259.198380] bridge0: port 1(bridge_slave_0) entered blocking state [ 1259.204888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1259.215290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1259.222961] bridge0: port 2(bridge_slave_1) entered blocking state [ 1259.229508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1259.248431] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1259.256444] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1259.268890] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1259.283549] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1259.294218] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1259.309513] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1259.316497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1259.328640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1259.337769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1259.353847] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1259.365648] 8021q: adding VLAN 0 to HW filter on device batadv0 06:02:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4c00, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x3ff7f8, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:07 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x140, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd57b844b93072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159a"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2800000000000000290000003900000027020201594887ccfe800000000000005900e7ffffff0000"], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r1, 0x0) r4 = syz_open_pts(r1, 0x212000) ioctl$TIOCCONS(r4, 0x541d) 06:02:07 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000140)={0xf, 0x1f, 0x10000, 0x3}, 0xf) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:07 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x4e, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0xfffffe42) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb700b25ec570ad9069ac3eb03056"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@ipx={0x4, 0x1000000001, 0x1, "e43ea5d95aa7", 0xff}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:07 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @fr_pvc=&(0x7f0000000000)={0x3f}}}) 06:02:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6800, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:08 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x3ff800, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f0000000b00)=ANY=[@ANYBLOB="c2c50b24811b03597a91baee6b8116e581b7bec8ff0043f5b9c5e5d1e4d23011036470fcd013460fa9e3fa47213e9b9320e9140ed86873f76447b4c30aadb36c2627f4822859ffe34df4dd6fd29082de3a68445bccfb33493a3c9b618d1c1904137688604ce00faeef9b1ee4184f241bd4d925d66be4aae74cfd7b97a3370398f70b0e18ce8910562ad3b798ce4d6f6a12dbd00ce05860f71019ad56fe185da0d184d3747cafdfaade0a1033bac53e10d422084c5725301d4761172434571cbafcc5400d8c1e9660d2679cedec9d4c1a9cfb983fc8af4ed64cb0826411523bb19961585a19c6eeaff73e", @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1260.079698] EXT4-fs (sda1): re-mounted. Opts: 06:02:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') write$P9_RVERSION(r2, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-'}, 0x28, 0x6) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040), 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_PRIMARY={0x8, 0xb, r5}, @IFLA_BOND_MODE={0x8, 0x1, 0x6}]}}}]}, 0x44}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000440)={'vcan0\x00', r5}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x17, r5, 0x1, 0x7, 0x6, @link_local}, 0x14) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6c00, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:08 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1260.326941] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 06:02:08 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6b6b6b, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:08 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0xffffffffffffff3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)) r4 = syz_open_pts(r3, 0x0) write$P9_RXATTRWALK(r0, &(0x7f00000001c0)={0xf, 0x1f, 0x2, 0x3f}, 0xf) dup3(r4, r2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000140)={'gretap0\x00', {0x2, 0x4e20, @empty}}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) write$selinux_context(r1, &(0x7f0000000280)='system_u:object_r:tape_device_t:s0\x00', 0x23) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1260.532282] EXT4-fs (sda1): re-mounted. Opts: 06:02:08 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:08 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000000001000600000000000000010000800000000044640000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000007f000200000000002360e5fb7e6ad816f4f88eab684ba66cdd0df38905a42b8c9963d479f2fe7f088827a4da7d0ffaec1dd9d103291ae12272fdbcdb30bdf89feb65c045908e04a70000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffffffff0000000042f60000000000003464000000d6a08337eaf89b279aeef9d5637248b2a2bd6ace698815c1e1d62d88edcb7c0197dff80b41b43470c07947d6aaf3fdb0aceb338a0852dbb01101fa65e7af2988fdb9f5e13faed63a5502a7488da102e3db8f2e46b6cdf40e0bccf5fc0663661cc18f75baff5c400896ada2c5034c24258f277a62bbb0ba0bb8dd0bc6e4ae20ef"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}}, 0x5f, 0x0, 0x0, &(0x7f0000000040), 0x28}, 0x10) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1260.653582] EXT4-fs (sda1): re-mounted. Opts: 06:02:08 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x4000, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000140)=0x6e, 0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7400, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:08 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xf83f00, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r11 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r12, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r13, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r14 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r13, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r14, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r14, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1261.113831] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1261.116296] EXT4-fs (sda1): re-mounted. Opts: 06:02:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000080)=0x80, 0x80000) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:09 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @null=' \x00'}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x64, 0xffffff9f, &(0x7f00000001c0)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee27401000000000000008c8f503c8fecee92e12a734f3b93ae1be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e000000000000", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c32108ace3c0ee06a8eee816a87da072"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000000001000600000000000000010000800000000044640000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000007f000200000000002360e5fb7e6ad816f4f88eab684ba66cdd0df38905a42b8c9963d479f2fe7f088827a4da7d0ffaec1dd9d103291ae12272fdbcdb30bdf89feb65c045908e04a70000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffffffff0000000042f60000000000003464000000d6a08337eaf89b279aeef9d5637248b2a2bd6ace698815c1e1d62d88edcb7c0197dff80b41b43470c07947d6aaf3fdb0aceb338a0852dbb01101fa65e7af2988fdb9f5e13faed63a5502a7488da102e3db8f2e46b6cdf40e0bccf5fc0663661cc18f75baff5c400896ada2c5034c24258f277a62bbb0ba0bb8dd0bc6e4ae20ef"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2800000000000000d60000e73800000027020201594a87cc0c810000000000005900000000000000"], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1261.251578] EXT4-fs (sda1): re-mounted. Opts: 06:02:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7a00, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'\x00r0\x10\x00\x04\x00\x17\x00\x00\x05\x00\x00\x00\x00\x02', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:09 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@ipv4={[], [], @multicast1}, 0xffff, 0x0, 0x3, 0xe, 0x4, 0x4}, &(0x7f00000001c0)=0x20) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r4, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r6, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r14, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f00000003c0)={0x0, r15+30000000}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r5, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES64, @ANYRES64=r11, @ANYRES64=r14, @ANYRESHEX=0x0, @ANYRES32=r15], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r16, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r17 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r16, 0x209}, &(0x7f00000006c0)=0xffffffffffffffcd) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r17, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r18, &(0x7f0000000340), 0x41395527) setsockopt$sock_int(r18, 0x1, 0x8, &(0x7f00000001c0)=0xf7, 0x4) ioctl(r17, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:09 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) read(r0, &(0x7f0000000000)=""/18, 0x12) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x400, 0x10080) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000200)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000000)) ptrace$setregset(0x4205, r2, 0x200, &(0x7f00000000c0)={&(0x7f0000000000)="f5cc1eeb64b81a50b7aacf6c42ebb606", 0x10}) syz_open_procfs(r2, &(0x7f00000000c0)='net/xfrm_stat\x00') setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @random="d6963f981c97"}, 0x10) [ 1261.822633] EXT4-fs (sda1): re-mounted. Opts: 06:02:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x3000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6b6b6b, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1262.131645] EXT4-fs (sda1): re-mounted. Opts: 06:02:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x4000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:10 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1262.320304] EXT4-fs (sda1): re-mounted. Opts: [ 1262.415780] EXT4-fs (sda1): re-mounted. Opts: 06:02:10 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:10 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000000001000600000000000000010000800000000044640000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000007f000200000000002360e5fb7e6ad816f4f88eab684ba66cdd0df38905a42b8c9963d479f2fe7f088827a4da7d0ffaec1dd9d103291ae12272fdbcdb30bdf89feb65c045908e04a70000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffffffff0000000042f60000000000003464000000d6a08337eaf89b279aeef9d5637248b2a2bd6ace698815c1e1d62d88edcb7c0197dff80b41b43470c07947d6aaf3fdb0aceb338a0852dbb01101fa65e7af2988fdb9f5e13faed63a5502a7488da102e3db8f2e46b6cdf40e0bccf5fc0663661cc18f75baff5c400896ada2c5034c24258f277a62bbb0ba0bb8dd0bc6e4ae20ef"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) r16 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl(r16, 0x8916, &(0x7f00000001c0)="67102723de18b309c1cbaa4a4f0504e7b105dd1ed777e8e9df486c7ff4f4ce99c344b66d826049b0a4197ae497df5932ea552f7797f906e459881abd9ab37ffcae4cba1a38b65b92663d29a88a6028afaad674b4f6c75a414550ced7a6163584c7a95732c172e8349c571e489039156b694985a857d955c2e5b170763278dbcb") setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:10 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000080)={r4}, 0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000000c0)={r4, 0x10, &(0x7f0000000080)=[@in={0x2, 0x4e20, @multicast1}]}, &(0x7f0000000100)=0x10) fadvise64(r1, 0x14, 0x1, 0x5) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_data=&(0x7f0000000040)="f3b4ff9d7131e36d5553bd2f4cadb59d05a766791b240d8c2392bfec842d2836"}) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) ioctl$KVM_TRANSLATE(r5, 0xc018ae85, &(0x7f0000000000)={0x5000, 0xd000, 0x4, 0x2}) 06:02:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x5000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:10 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x40, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000280)={{0xfffffffffffffff9, 0x2, 0x93, 0x3, 0x1}, 0x9, 0x76a, 0xffffffff}) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:10 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1262.891219] EXT4-fs (sda1): re-mounted. Opts: 06:02:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1262.975341] device bridge_slave_1 left promiscuous mode [ 1262.989627] bridge0: port 2(bridge_slave_1) entered disabled state 06:02:11 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x51, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000030000004a000000886c7465616d5f73566176655f30000000001200000000000000000000000000000476657468305f746f5f62726964676500766c616e300000000000000000000000aaaaaaaaaabbff00ff000000aaaaaaaaaa12ff00ffffffff000070000000a0000000e800000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff0000000052415445455354000000000000000000ff000000000000000000000000000000200000000000000073797a30000000000000000000000000040200000000000003000000000000000d000000040000000200716cfd844783183f319621a21c6330000000000000000000000076657468305f746f5f7465616d000000626f6e645f736c6176655f310000000073797a6b61676c657230000000000000ffffffffffff00ffffff2400ffffffffffffffff00ffff00000070dde97300000070000000a0000000434f4e4e5345434d41524b0000000000000000000000000000001f00000000000800000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff010000000300000004000000fbff6970366772657461703000000000000073797a6b616c6c6572310000000000006e6c6d6f6e3000000000000000000000726f7365300000000000000000000000aaaaaaaaaaaa0000ffbaffff0180c200000e00ffffff00ff000058010000d00100000002000069703600000000000000000000000000000000000000000040000000000000005000000000000000ff020000000004000000000000000001fe80000000000000000000000000002400000000ffffffff000000f7ffffffff00000000ffffff000048154e244e244e234e21000000007261030000000000000000000000000000000000000000000000000000000000480000000000000062617461647630000000000100000000626373663000000000000000000000003d0003000900000002000000000001000600000000000000010000800000000044640000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000007f000200000000002360e5fb7e6ad816f4f88eab684ba66cdd0df38905a42b8c9963d479f2fe7f088827a4da7d0ffaec1dd9d103291ae12272fdbcdb30bdf89feb65c045908e04a70000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffffffff0000000042f60000000000003464000000d6a08337eaf89b279aeef9d5637248b2a2bd6ace698815c1e1d62d88edcb7c0197dff80b41b43470c07947d6aaf3fdb0aceb338a0852dbb01101fa65e7af2988fdb9f5e13faed63a5502a7488da102e3db8f2e46b6cdf40e0bccf5fc0663661cc18f75baff5c400896ada2c5034c24258f277a62bbb0ba0bb8dd0bc6e4ae20ef"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:11 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, r1, 0x4, 0x70bd2d, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x80}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x8, 0x9, 0x6]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x14014480}, 0x10) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x2000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1263.060534] device bridge_slave_0 left promiscuous mode [ 1263.069842] bridge0: port 1(bridge_slave_0) entered disabled state 06:02:11 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) fanotify_mark(r0, 0x28, 0x1, r1, &(0x7f00000002c0)='./file0\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) futex(&(0x7f0000000140)=0x2, 0x8b, 0x1, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f0000000280), 0x2) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x7000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:11 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) eventfd(0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x11217, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_data=&(0x7f00000000c0)="f335e2f7e7b5ff94dbbf80cde9fb8aaeb2488c41ce9ab542dcf27e0a5d44b20a"}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) [ 1263.351381] EXT4-fs (sda1): re-mounted. Opts: 06:02:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x3000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1263.549266] device hsr_slave_1 left promiscuous mode [ 1263.628605] device hsr_slave_0 left promiscuous mode 06:02:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x10000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1263.677821] team0 (unregistering): Port device team_slave_1 removed [ 1263.756405] team0 (unregistering): Port device team_slave_0 removed 06:02:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x4000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1263.840880] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1263.938975] bond0 (unregistering): Releasing backup interface bond_slave_0 06:02:12 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x110e0000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1264.307447] bond0 (unregistering): Released all slaves [ 1265.759220] IPVS: ftp: loaded support on port[0] = 21 [ 1265.830159] chnl_net:caif_netlink_parms(): no params data found [ 1265.868319] bridge0: port 1(bridge_slave_0) entered blocking state [ 1265.874822] bridge0: port 1(bridge_slave_0) entered disabled state [ 1265.881844] device bridge_slave_0 entered promiscuous mode [ 1265.889539] bridge0: port 2(bridge_slave_1) entered blocking state [ 1265.896077] bridge0: port 2(bridge_slave_1) entered disabled state [ 1265.903080] device bridge_slave_1 entered promiscuous mode [ 1265.925761] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1265.935416] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1265.952244] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1265.960360] team0: Port device team_slave_0 added [ 1265.966274] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1265.973930] team0: Port device team_slave_1 added [ 1265.979434] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1265.987096] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1266.055639] device hsr_slave_0 entered promiscuous mode [ 1266.103707] device hsr_slave_1 entered promiscuous mode [ 1266.144021] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1266.151099] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1266.165907] bridge0: port 2(bridge_slave_1) entered blocking state [ 1266.172586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1266.179875] bridge0: port 1(bridge_slave_0) entered blocking state [ 1266.186582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1266.223171] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1266.229859] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1266.239487] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1266.249956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1266.257695] bridge0: port 1(bridge_slave_0) entered disabled state [ 1266.265233] bridge0: port 2(bridge_slave_1) entered disabled state [ 1266.272445] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1266.282357] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1266.289185] 8021q: adding VLAN 0 to HW filter on device team0 [ 1266.299147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1266.308161] bridge0: port 1(bridge_slave_0) entered blocking state [ 1266.314596] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1266.334070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1266.341791] bridge0: port 2(bridge_slave_1) entered blocking state [ 1266.348295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1266.357412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1266.367982] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1266.376860] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1266.389577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1266.400397] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1266.411312] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1266.419351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1266.427038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1266.441311] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1266.453437] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1266.515458] EXT4-fs: 2 callbacks suppressed [ 1266.515470] EXT4-fs (sda1): re-mounted. Opts: 06:02:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x5000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x3acac9e4f2874426, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_addrs=@tipc=@name={0x1e, 0x2, 0x1, {{0x42, 0x1}, 0x3}}}) 06:02:14 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000300)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2800000800000000d1000000000000000000f6ffffff00d887be40dce440d648eefa31f6baa04e238b8dfded566fa44c20f0038c974beee7a3c502b8c048039aadd2086e85c77bf12f5e"], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:14 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000500)='./file0\x00') pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={r2}, 0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r2}, 0x8) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000200)) ptrace(0x10, r3) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000000)) ptrace$setregset(0x4205, r3, 0x200, &(0x7f00000000c0)={&(0x7f0000000000)="f5cc1eeb64b81a50b7aacf6c42ebb606", 0x10}) r4 = getpgrp(r3) move_pages(r4, 0x8, &(0x7f0000000440)=[&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil], 0x0, &(0x7f00000004c0)=[0x0], 0xa) r5 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01000000fd233227b94d47962ec8243b72d995ac10f7f8c14c124fdbab4b5190ffffffffff85552de4c3aedf9ef8b617b635d922aecd4bcc60b4bae366f242c2bf1ddecaf4ef6b10dc649126dccfdfc33fd9a77ddd1e0f0b309c3edecca4f9e12c321cf9ef9b63ec240669182726626340fc4e4ba32ba736f357d629d5c340f05010e0bccfd0d8f417c60ce2f00edfca8f7b2875dbfb9ea3e795fd89e3d92ab5e6951764e248f191e3e2fcb0af1701", @ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000080)={r6}, 0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={r2, 0x80, 0x2, 0xffff, 0x3, 0x800, 0x2, 0xe9, {r6, @in={{0x2, 0x4e23, @multicast2}}, 0x5, 0x100000001, 0x5, 0x6}}, &(0x7f00000001c0)=0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)=0xfffffffffffffffa, 0x4) 06:02:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:14 executing program 3: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) bind$rose(r0, &(0x7f0000000100)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r1, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r4, &(0x7f00000004c0)={0xa0, 0x19, 0x2, {0x80, {0x80, 0x4}, 0x23, r5, r6, 0xfffffffffffffffd, 0x6, 0x20, 0xdb64, 0x1, 0x7, 0x7, 0x80000000, 0x2, 0x8, 0x6, 0xb54, 0x56b, 0x6, 0x9}}, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r7}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x8, @mcast1, 0x8}, {0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, r7}}, 0x48) [ 1266.810639] EXT4-fs (sda1): re-mounted. Opts: 06:02:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x6000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x20000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:15 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff000600090805006956a61c682213a5594d6fbabae6fd5744b9a9353b2b62303072b87ab18d40fd443e24ae3ac3f5e100042a4d1e159aaa"], 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572ad9069ac3e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2800000000000000290000003900000027020201594a87ccfe800000000000085900000000000000391f14731a0f99698c8bc1c5c9d07730d28b2f25925dd5a44a9b5f22c5925239352353b5119c6e02c4a819ed2f631b20895c5d9d0716a6d61b950bb18b6028400959fdabc313eb61fb51dc5fc9f81b9fa9a9"], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x22000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1267.350383] EXT4-fs (sda1): re-mounted. Opts: [ 1267.364376] device bridge_slave_1 left promiscuous mode [ 1267.371088] bridge0: port 2(bridge_slave_1) entered disabled state [ 1267.456617] device bridge_slave_0 left promiscuous mode [ 1267.462436] bridge0: port 1(bridge_slave_0) entered disabled state 06:02:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x7000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:15 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x400000, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000380)) fsetxattr$security_selinux(r0, &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dmesg_exec_t:s0\x00', 0x22, 0x2) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x101000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x174) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x1208021, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x200, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x2) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0xffffffffffffffb7) r3 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in=@dev, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in=@empty}}, 0xe8) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x2c000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1267.660765] audit: type=1400 audit(1568181735.731:76): avc: denied { relabelfrom } for pid=24272 comm="syz-executor.0" name="" dev="pipefs" ino=146586 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 06:02:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000000)={0x5, 0x0, 0xffffffff80000001, 0x4, 0x10000, 0x2}) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) [ 1267.798157] EXT4-fs (sda1): re-mounted. Opts: [ 1267.896354] device hsr_slave_1 left promiscuous mode 06:02:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x10000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:16 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) pipe(&(0x7f0000000140)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1267.971996] device hsr_slave_0 left promiscuous mode 06:02:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1268.048654] team0 (unregistering): Port device team_slave_1 removed [ 1268.172033] team0 (unregistering): Port device team_slave_0 removed [ 1268.262844] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1268.346403] EXT4-fs (sda1): re-mounted. Opts: 06:02:16 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1268.370715] bond0 (unregistering): Releasing backup interface bond_slave_0 06:02:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x40000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1268.566758] bond0 (unregistering): Released all slaves [ 1270.289363] IPVS: ftp: loaded support on port[0] = 21 [ 1270.360989] chnl_net:caif_netlink_parms(): no params data found [ 1270.397797] bridge0: port 1(bridge_slave_0) entered blocking state [ 1270.404521] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.411648] device bridge_slave_0 entered promiscuous mode [ 1270.418934] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.425797] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.433034] device bridge_slave_1 entered promiscuous mode [ 1270.455317] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1270.465215] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1270.482693] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1270.490485] team0: Port device team_slave_0 added [ 1270.496930] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1270.505828] team0: Port device team_slave_1 added [ 1270.511361] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1270.519235] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1270.576034] device hsr_slave_0 entered promiscuous mode [ 1270.623788] device hsr_slave_1 entered promiscuous mode [ 1270.674502] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1270.681603] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1270.700088] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.706539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1270.713562] bridge0: port 1(bridge_slave_0) entered blocking state [ 1270.719919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1270.760869] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1270.767610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1270.777384] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1270.788417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1270.795860] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.802670] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.809905] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1270.821635] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1270.828317] 8021q: adding VLAN 0 to HW filter on device team0 [ 1270.838783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1270.848522] bridge0: port 1(bridge_slave_0) entered blocking state [ 1270.855220] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1270.866536] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1270.874398] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.880918] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1270.898803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1270.907224] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1270.918837] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1270.934568] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1270.944894] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1270.956772] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1270.963870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1270.971952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1270.980684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1270.994445] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1271.007722] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1271.133596] EXT4-fs (sda1): re-mounted. Opts: 06:02:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x110e0000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:19 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r5, r6, 0x0, 0x35c, &(0x7f00000001c0)='\x00', 0xffffffffffffffff}, 0x30) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r9, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x15, 0x80005, 0x0) getsockopt(r11, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) r12 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r13 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r13, 0x40045431, &(0x7f0000000100)) r14 = syz_open_pts(r13, 0x0) dup3(r14, r12, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f00000003c0)={0x0, r15+30000000}, 0x0) r17 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r18 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r18, 0x40045431, &(0x7f0000000100)) r19 = syz_open_pts(r18, 0x0) dup3(r19, r17, 0x0) r20 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r21 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r21, 0x40045431, &(0x7f0000000100)) r22 = syz_open_pts(r21, 0x0) r23 = dup3(r22, r20, 0x0) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r24, 0x40045431, &(0x7f0000000100)) syz_open_pts(r24, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r25, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r11, 0x84, 0x77, &(0x7f0000000b00)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB, @ANYBLOB="9c127f1e18d4bf658fc31daf83cc7560b4210af80e7341b9d3e18a19134ac1b4d4", @ANYPTR], @ANYRES16=0x0, @ANYBLOB="4841ddd1a32ed497d510e17fb968cf2ac03dd82972cd92d73c69ac3fc9cd53fe", @ANYBLOB="5d551a3b3d3f612e5bacdc1dba64a9557eff6a037c1060d9687bdf4d52aeb275ce8469a22b89ff12bac8252d377dd39060068a05683038a37d10bd883fd205468ff0e0da5d30773b822b3601f0f950", @ANYRES16=0x0], 0x0) r26 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r26, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r27 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r28 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r28, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r29 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r29, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r30 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r30, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r31 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r31, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f00000003c0)={0x0, r32+30000000}, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) vmsplice(r33, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r34 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r34, 0x40045431, &(0x7f0000000100)) syz_open_pts(r34, 0x0) r35 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r36 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r36, 0x40045431, &(0x7f0000000100)) r37 = syz_open_pts(r36, 0x0) dup3(r37, r35, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f00000003c0)={0x0, r38+30000000}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000bc0)=ANY=[@ANYRESDEC=r4, @ANYRES16=r16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYRES64, @ANYBLOB="bb6c029ca26237753c318e0ab5cf58cc9bf31e90ae197d07c3998fafc2565d115ae5505ce8900d764b446ae90f94739225313c859efba8b016f14db9d025a5514140a62d4cbf63f1c7a77187b775ba07", @ANYRES64=r32, @ANYRES64=r16], @ANYPTR64, @ANYRES32, @ANYRES64=0x0, @ANYRESHEX=r33, @ANYPTR64=&(0x7f0000000b80)=ANY=[@ANYPTR=&(0x7f00000024c0)=ANY=[@ANYRESOCT, @ANYRES32=r7, @ANYRESDEC=0x0, @ANYRES16=r23, @ANYBLOB="b4e87ebc66034fad664d04c77f7cadcfb7d84a03997ca042b247a46a38db5a2f3a638a07214baecb3e621308c5f5b36e7fcd5d59c362b594fd10902071574cb57fb54acfeb7c4dad3c765f74bdb0afb633235cf512de1767ead83c3836c2bb1b98cc7a0df842c28bf61b5e5f206db7c6d02abcc2b7034d2897fb45736d8904214b774ea379f150c8b0694b2c7502b0b47a513b24bda1c4e6ce1e525753b95a7ffeab3deac9afb337a5de31f83545ea2530099d16955b9db525d6b1bda57c34545960eeafb4f4fc10eedb64a3ddb6492df3a952b0fb067505587be2cbe64ed18dc95bd6be", @ANYRESHEX, @ANYRESHEX, @ANYRES32=r38]]], 0x8}, 0x1, 0x0, 0x0, 0x20000000}, 0x400b0) setsockopt$EBT_SO_SET_ENTRIES(r27, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r39, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r40 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r26, 0x84, 0x76, &(0x7f0000000680)={r39, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r26, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r40, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r10, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r40, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x48000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:19 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x7, 0x40000) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) r2 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080)={r3}, 0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r3}, 0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={r3, 0xff, 0x6, 0xa9e0, 0x8, 0xffffffff, 0x2, 0x9, {0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x1, 0x1, 0x1, 0x9, 0x6}}, &(0x7f0000000440)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000480)={r4, 0x3}, &(0x7f00000004c0)=0x8) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64IPIN\x00', &(0x7f0000000340)='NET_DM\x00', 0x7, 0x5) syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setresgid(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) r5 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000080)={r6}, 0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r6}, 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000080)={r6}, 0xfd5e) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r4}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000001c0)={r4, 0x1000, "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"}, &(0x7f0000000000)=0x1008) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000040)=r7, 0x4) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:19 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_data=&(0x7f0000000000)="2557d067e041d5d305b7705af3a02717e44259f88a595cd7d8d299b0409477ae"}) [ 1271.362458] ucma_write: process 659 (syz-executor.0) changed security contexts after opening file descriptor, this is not allowed. 06:02:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1271.520345] EXT4-fs (sda1): re-mounted. Opts: 06:02:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:19 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f00000001c0)='./file0\x00', 0xc54f, 0x2, &(0x7f0000000380)=[{&(0x7f0000000280)="6c57c7cde6e4ede48b4f2e248f9302c0cd7577b06ba832ff47e21ec637963eb092e75a3a21a408ee24f419490fedcb7fbaae259e0c2bfc3003f3819f2082052b67d51e603071f576989fb6a6bc743c3bcdbb5b095fc56a73c69ee02d8cf6c186b7168fb3b33d7f2ae78fd2373a4d592171eff10ae3e0dfa62005c2abc4638e097e8453a1bb1a9a65c5ece9d38af83246f82e37e09c75d97e38341487c4c744cb151fb2b42b9b4c0b90c9e73b15e9257db546c36414a84e0ec53f7fe0bafb8d22cfea4a882d32521800c41463335e", 0xce, 0x34c3}, {&(0x7f0000000ec0)="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", 0x1000, 0x4b5f}], 0x801038, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f00000003c0)={0x5c2e, 0x9, 0x2}) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:19 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0xc60400) shutdown(r1, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xaf5968d44fbef16e, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000040)={0x11e0b0a2}, 0x4) 06:02:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1271.959455] EXT4-fs (sda1): re-mounted. Opts: 06:02:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x60000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1272.064789] device bridge_slave_1 left promiscuous mode [ 1272.072644] bridge0: port 2(bridge_slave_1) entered disabled state [ 1272.198026] EXT4-fs (sda1): re-mounted. Opts: [ 1272.234367] device bridge_slave_0 left promiscuous mode [ 1272.282153] bridge0: port 1(bridge_slave_0) entered disabled state 06:02:20 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080), 0x2) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r1, 0x891e, &(0x7f0000000180)={'\xc6xD\x1a\xce\x00', @ifru_settings={0x2, 0x0, @te1=&(0x7f0000000000)={0x3, 0x1f, 0x2002, 0xffffffffffffff88}}}) 06:02:20 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) getpeername$inet(r0, &(0x7f0000000140)={0x2, 0x0, @initdev}, &(0x7f00000001c0)=0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:20 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000140)="0adc1f023c123f88a07000") r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r2, &(0x7f00000007c0)={0x9, @remote={[], 0x2}}, 0x12) r3 = socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f00000008c0)=',){\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r3, 0x0, 0xb, &(0x7f0000000940)='nr0\x00\x00\x04\x00\xff\xff\xff\x00', 0xffffffffffffffff}, 0x30) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0x5e, 0x0, &(0x7f0000000080)="2cf10912f8de8c711ab84c437c0953743b5938592a7fe17082531c0da32595cf15f8a0367e0caee2744220592ebb5227f38c8f503ce8d081e223ed8fecee92ae3be811c6a2127d24f2f8d665d743afd6009b100659887ad0ea39ab718e5e", 0x0, 0xc558}, 0x28) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x15, 0x80005, 0x0) getsockopt(r7, 0x200000000114, 0x2712, &(0x7f0000000040)=""/1, &(0x7f0000000080)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYBLOB="ff001700d5090805006956a61c682213a5594d6fbabae6035744b9a9353b2b62303072b87ab18d40fdc43e24ae3ac3f5e100042a4d1e159a"], 0x0) r8 = accept$inet(r1, &(0x7f0000000340)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000003c0)={0x3, 0x2, 0x800}, &(0x7f0000000780)=0x10) r9 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000880)='TIPCv2\x00') r10 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r12 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r12, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) r13 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r13, 0x6, 0x8, &(0x7f00000039c0)=0xfffffffffffffffc, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYRESHEX=r10, @ANYRESOCT=0x0, @ANYRES64=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES64=0x0, @ANYRES16, @ANYRES16, @ANYPTR64=&(0x7f0000000b80)=ANY=[], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r13, @ANYBLOB="afa3d823c3218f2fceb7dcb25ec572c390693e"]]], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x4a6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]}, 0x521) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x6}}}, &(0x7f0000000540)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000580)={r14, 0xfff, 0x10}, &(0x7f00000005c0)=0xc) r15 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'batadv0\x00', 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000740)={0x0, @speck128}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000680)={r14, 0x209}, &(0x7f00000006c0)=0x8) getsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000a40)=0xbaa, &(0x7f0000000a80)=0x1) ioctl$sock_inet_udp_SIOCINQ(r15, 0x541b, &(0x7f0000000300)) ioctl(r2, 0x8916, &(0x7f0000000800)) setsockopt$sock_int(r6, 0x1, 0x12, &(0x7f0000000700)=0xf8, 0x4) ioctl(r15, 0x8982, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x28, 0x29, 0x39, "27020201594a87ccfe8000000000000059"}], 0x28}, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'nr0\x00\x00\x04\x00\xff\xff\xff\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 06:02:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x20000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x68000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) 06:02:20 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) 06:02:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6b6b6b00, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1272.719254] device hsr_slave_1 left promiscuous mode [ 1272.722905] EXT4-fs (sda1): re-mounted. Opts: [ 1272.824458] device hsr_slave_0 left promiscuous mode 06:02:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1272.938050] team0 (unregistering): Port device team_slave_1 removed [ 1273.045855] team0 (unregistering): Port device team_slave_0 removed [ 1273.119178] bond0 (unregistering): Releasing backup interface bond_slave_1 06:02:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000c00)='./file0\x00', 0x0, 0x0) pipe(0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x100032, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x3000)=nil) pipe(&(0x7f0000000540)) io_submit(0x0, 0x0, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@empty, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}}) [ 1273.220867] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1273.279861] EXT4-fs (sda1): re-mounted. Opts: 06:02:21 executing program 0: socket$inet6(0xa, 0x6, 0x0) pipe(&(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x3, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x101800, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) pivot_root(0x0, &(0x7f0000000d00)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x1}) r3 = syz_open_pts(r2, 0x0) dup3(r3, r1, 0x0) write$P9_RAUTH(r1, &(0x7f00000001c0)={0x14, 0x67, 0x2, {0x80, 0x2}}, 0x14) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e22, @rand_addr=0x3}, {0x2, 0x0, @local}, {0x2, 0x0, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 1273.680554] bond0 (unregistering): Released all slaves [ 1275.090042] IPVS: ftp: loaded support on port[0] = 21 [ 1275.252745] chnl_net:caif_netlink_parms(): no params data found [ 1275.331354] bridge0: port 1(bridge_slave_0) entered blocking state [ 1275.346108] bridge0: port 1(bridge_slave_0) entered disabled state [ 1275.358382] device bridge_slave_0 entered promiscuous mode [ 1275.370394] bridge0: port 2(bridge_slave_1) entered blocking state [ 1275.381606] bridge0: port 2(bridge_slave_1) entered disabled state [ 1275.392701] device bridge_slave_1 entered promiscuous mode [ 1275.438070] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1275.452162] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1275.489240] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1275.502383] team0: Port device team_slave_0 added [ 1275.510898] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1275.527066] team0: Port device team_slave_1 added [ 1275.538257] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1275.549753] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1379.523275] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1379.529585] rcu: 1-....: (10519 ticks this GP) idle=246/1/0x4000000000000004 softirq=167927/167929 fqs=5229 [ 1379.540252] rcu: (t=10500 jiffies g=224197 q=314) [ 1379.545269] NMI backtrace for cpu 1 [ 1379.548971] CPU: 1 PID: 22013 Comm: kworker/u4:2 Not tainted 4.19.72 #0 [ 1379.555711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.565152] Workqueue: netns cleanup_net [ 1379.569207] Call Trace: [ 1379.571778] [ 1379.573926] dump_stack+0x172/0x1f0 [ 1379.577647] nmi_cpu_backtrace.cold+0x63/0xa4 [ 1379.582130] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 1379.587050] nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 [ 1379.592449] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1379.597641] rcu_dump_cpu_stacks+0x189/0x1d5 [ 1379.602127] rcu_check_callbacks.cold+0x5e3/0xd90 [ 1379.607004] ? trace_hardirqs_off+0x62/0x220 [ 1379.611407] update_process_times+0x32/0x80 [ 1379.615734] tick_sched_handle+0xa2/0x190 [ 1379.620039] tick_sched_timer+0x47/0x130 [ 1379.624085] __hrtimer_run_queues+0x33b/0xdc0 [ 1379.628586] ? tick_sched_do_timer+0x1b0/0x1b0 [ 1379.633175] ? hrtimer_fixup_activate+0x30/0x30 [ 1379.638453] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1379.643462] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 1379.648821] hrtimer_interrupt+0x314/0x770 [ 1379.653049] smp_apic_timer_interrupt+0x111/0x550 [ 1379.657886] apic_timer_interrupt+0xf/0x20 [ 1379.662116] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x50 [ 1379.667619] Code: 41 bc f4 ff ff ff e8 33 66 ea ff 48 c7 05 44 22 cd 08 00 00 00 00 e9 ca e9 ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <55> 48 89 e5 48 8b 75 08 65 48 8b 04 25 40 ee 01 00 65 8b 15 28 97 [ 1379.687643] RSP: 0018:ffff8880ae9074d0 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 [ 1379.695343] RAX: 0000000000000501 RBX: ffff8880923314b8 RCX: ffffffff858e7e8e [ 1379.702701] RDX: 0000000000000001 RSI: 0000000000000001 RDI: 0000000000000001 [ 1379.709972] RBP: ffff8880ae907528 R08: ffff8880830fe4c0 R09: 0000000000000009 [ 1379.717329] R10: ffff8880830feea8 R11: 000000002bf83297 R12: dffffc0000000000 [ 1379.724591] R13: ffff888092331200 R14: ffff888092331558 R15: ffff888092331550 [ 1379.732299] ? apic_timer_interrupt+0xa/0x20 [ 1379.736787] ? hhf_dequeue+0x65e/0xa00 [ 1379.740766] ? hhf_dequeue+0x670/0xa00 [ 1379.744739] __qdisc_run+0x1e7/0x1960 [ 1379.748883] __dev_queue_xmit+0x165c/0x2fe0 [ 1379.753289] ? netdev_pick_tx+0x300/0x300 [ 1379.757442] ? ip6_finish_output2+0xae0/0x2550 [ 1379.762013] ? find_held_lock+0x35/0x130 [ 1379.766070] ? ip6_finish_output2+0xb7f/0x2550 [ 1379.770735] ? mark_held_locks+0xb1/0x100 [ 1379.774872] dev_queue_xmit+0x18/0x20 [ 1379.778665] ? dev_queue_xmit+0x18/0x20 [ 1379.782623] neigh_resolve_output+0x5b7/0x980 [ 1379.787209] ip6_finish_output2+0xb7f/0x2550 [ 1379.791616] ? ip6_forward_finish+0x4d0/0x4d0 [ 1379.796100] ? lock_downgrade+0x810/0x810 [ 1379.800243] ? kasan_check_read+0x11/0x20 [ 1379.804386] ip6_finish_output+0x574/0xbe0 [ 1379.808622] ? ip6_finish_output+0x574/0xbe0 [ 1379.813016] ip6_output+0x235/0x7c0 [ 1379.816634] ? ip6_finish_output+0xbe0/0xbe0 [ 1379.821027] ? ip6_fragment+0x3770/0x3770 [ 1379.825165] ndisc_send_skb+0xf3b/0x1460 [ 1379.829212] ? nf_hook.constprop.0+0x560/0x560 [ 1379.833792] ? memcpy+0x46/0x50 [ 1379.837063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1379.842584] ndisc_send_rs+0x134/0x6d0 [ 1379.846462] addrconf_rs_timer+0x30f/0x680 [ 1379.850771] ? ipv6_get_lladdr+0x490/0x490 [ 1379.855046] call_timer_fn+0x18d/0x720 [ 1379.858916] ? ipv6_get_lladdr+0x490/0x490 [ 1379.863155] ? process_timeout+0x40/0x40 [ 1379.867227] ? run_timer_softirq+0x647/0x1700 [ 1379.871739] ? trace_hardirqs_on+0x67/0x220 [ 1379.876063] ? kasan_check_read+0x11/0x20 [ 1379.880205] ? ipv6_get_lladdr+0x490/0x490 [ 1379.884433] run_timer_softirq+0x652/0x1700 [ 1379.888742] ? add_timer+0xbe0/0xbe0 [ 1379.892447] ? __lock_is_held+0xb6/0x140 [ 1379.896501] __do_softirq+0x25c/0x921 [ 1379.900287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1379.905807] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1379.911344] irq_exit+0x180/0x1d0 [ 1379.914785] smp_apic_timer_interrupt+0x13b/0x550 [ 1379.919797] apic_timer_interrupt+0xf/0x20 [ 1379.924012] [ 1379.926246] RIP: 0010:write_comp_data+0x0/0x70 [ 1379.930817] Code: 83 fa 02 75 20 48 8b 88 d8 12 00 00 8b 80 d4 12 00 00 48 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 5d c3 0f 1f 00 <65> 4c 8b 04 25 40 ee 01 00 65 8b 05 e0 96 96 7e a9 00 01 1f 00 75 [ 1379.949925] RSP: 0018:ffff88808bff7b70 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 1379.957801] RAX: 0000000000000001 RBX: 0000000000000001 RCX: ffffffff85ccaa0b [ 1379.965297] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000001 [ 1379.972566] RBP: ffff88808bff7b78 R08: 1ffff11015d24732 R09: ffffed1015d24733 [ 1379.980325] R10: ffffed1015d24732 R11: ffff8880ae923993 R12: 0000000000000002 [ 1379.987942] R13: 0000000000000001 R14: 0000000000062155 R15: dffffc0000000000 [ 1379.995697] ? inet_twsk_purge+0x53b/0x5e8 [ 1379.999929] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1380.005580] inet_twsk_purge+0x53b/0x5e8 [ 1380.009640] ? ip_queue_xmit+0x70/0x70 [ 1380.013605] ? dccp_v4_exit_batch+0x20/0x20 [ 1380.017921] dccp_v4_exit_batch+0x1a/0x20 [ 1380.022066] ops_exit_list.isra.0+0xfc/0x150 [ 1380.026470] cleanup_net+0x3fb/0x960 [ 1380.030198] ? unregister_pernet_device+0x80/0x80 [ 1380.035153] ? __lock_is_held+0xb6/0x140 [ 1380.039474] process_one_work+0x989/0x1750 [ 1380.044924] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1380.049592] ? lock_acquire+0x16f/0x3f0 [ 1380.053916] ? kasan_check_write+0x14/0x20 [ 1380.058144] ? do_raw_spin_lock+0xc8/0x240 [ 1380.062477] worker_thread+0x98/0xe40 [ 1380.067255] ? trace_hardirqs_on+0x67/0x220 [ 1380.071584] kthread+0x354/0x420 [ 1380.074951] ? process_one_work+0x1750/0x1750 [ 1380.079977] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1380.085629] ret_from_fork+0x24/0x30