[ 262.243035][ T1859] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 262.301125][ T1859] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. [ 262.338871][ T1859] netlink: 4 bytes leftover after parsing attributes in process `dhcpcd'. Warning: Permanently added '[localhost]:23106' (ECDSA) to the list of known hosts. 1970/01/01 00:06:14 fuzzer started 1970/01/01 00:06:26 dialing manager at localhost:45165 [ 393.156452][ T2032] cgroup: Unknown subsys name 'net' [ 394.148840][ T2032] cgroup: Unknown subsys name 'rlimit' 1970/01/01 00:06:33 syscalls: 2918 1970/01/01 00:06:33 code coverage: enabled 1970/01/01 00:06:33 comparison tracing: enabled 1970/01/01 00:06:33 extra coverage: ioctl(KCOV_DISABLE) failed: invalid argument 1970/01/01 00:06:33 delay kcov mmap: mmap returned an invalid pointer 1970/01/01 00:06:33 setuid sandbox: enabled 1970/01/01 00:06:33 namespace sandbox: enabled 1970/01/01 00:06:33 Android sandbox: /sys/fs/selinux/policy does not exist 1970/01/01 00:06:33 fault injection: enabled 1970/01/01 00:06:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 1970/01/01 00:06:33 net packet injection: enabled 1970/01/01 00:06:33 net device setup: enabled 1970/01/01 00:06:33 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 1970/01/01 00:06:33 devlink PCI setup: PCI device 0000:00:10.0 is not available 1970/01/01 00:06:33 NIC VF setup: PCI device 0000:00:11.0 is not available 1970/01/01 00:06:33 USB emulation: enabled 1970/01/01 00:06:33 hci packet injection: /dev/vhci does not exist 1970/01/01 00:06:33 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 1970/01/01 00:06:33 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 1970/01/01 00:06:34 fetching corpus: 0, signal 0/2000 (executing program) 1970/01/01 00:06:39 fetching corpus: 50, signal 30421/33803 (executing program) 1970/01/01 00:06:42 fetching corpus: 100, signal 44684/49268 (executing program) 1970/01/01 00:06:46 fetching corpus: 150, signal 53379/59164 (executing program) 1970/01/01 00:06:48 fetching corpus: 200, signal 62415/69182 (executing program) 1970/01/01 00:06:51 fetching corpus: 249, signal 68816/76591 (executing program) 1970/01/01 00:06:53 fetching corpus: 299, signal 74171/82874 (executing program) 1970/01/01 00:06:55 fetching corpus: 349, signal 77833/87546 (executing program) 1970/01/01 00:06:58 fetching corpus: 399, signal 83940/94259 (executing program) 1970/01/01 00:07:01 fetching corpus: 449, signal 87907/98940 (executing program) 1970/01/01 00:07:03 fetching corpus: 499, signal 91910/103572 (executing program) 1970/01/01 00:07:08 fetching corpus: 548, signal 95258/107553 (executing program) 1970/01/01 00:07:11 fetching corpus: 597, signal 97909/110938 (executing program) 1970/01/01 00:07:14 fetching corpus: 647, signal 100630/114270 (executing program) 1970/01/01 00:07:16 fetching corpus: 697, signal 102916/117135 (executing program) 1970/01/01 00:07:19 fetching corpus: 747, signal 105622/120357 (executing program) 1970/01/01 00:07:25 fetching corpus: 797, signal 108802/123887 (executing program) 1970/01/01 00:07:27 fetching corpus: 847, signal 110495/126158 (executing program) 1970/01/01 00:07:31 fetching corpus: 897, signal 112202/128391 (executing program) 1970/01/01 00:07:33 fetching corpus: 946, signal 114784/131289 (executing program) 1970/01/01 00:07:36 fetching corpus: 996, signal 116867/133745 (executing program) 1970/01/01 00:07:38 fetching corpus: 1046, signal 119410/136555 (executing program) 1970/01/01 00:07:40 fetching corpus: 1096, signal 120815/138429 (executing program) 1970/01/01 00:07:42 fetching corpus: 1146, signal 123227/141005 (executing program) 1970/01/01 00:07:47 fetching corpus: 1196, signal 125291/143264 (executing program) 1970/01/01 00:07:50 fetching corpus: 1246, signal 126588/144937 (executing program) 1970/01/01 00:07:53 fetching corpus: 1296, signal 127447/146274 (executing program) 1970/01/01 00:07:57 fetching corpus: 1346, signal 129357/148275 (executing program) 1970/01/01 00:07:59 fetching corpus: 1396, signal 130399/149709 (executing program) 1970/01/01 00:08:02 fetching corpus: 1446, signal 132645/151930 (executing program) 1970/01/01 00:08:04 fetching corpus: 1496, signal 134246/153695 (executing program) 1970/01/01 00:08:06 fetching corpus: 1546, signal 135818/155370 (executing program) 1970/01/01 00:08:09 fetching corpus: 1596, signal 136896/156698 (executing program) 1970/01/01 00:08:11 fetching corpus: 1646, signal 138180/158093 (executing program) 1970/01/01 00:08:14 fetching corpus: 1696, signal 139200/159301 (executing program) 1970/01/01 00:08:16 fetching corpus: 1746, signal 140285/160592 (executing program) 1970/01/01 00:08:19 fetching corpus: 1796, signal 141402/161875 (executing program) 1970/01/01 00:08:21 fetching corpus: 1846, signal 142858/163308 (executing program) 1970/01/01 00:08:25 fetching corpus: 1895, signal 144106/164590 (executing program) 1970/01/01 00:08:27 fetching corpus: 1945, signal 145573/165992 (executing program) 1970/01/01 00:08:30 fetching corpus: 1995, signal 146575/167100 (executing program) 1970/01/01 00:08:31 fetching corpus: 2045, signal 147407/168033 (executing program) 1970/01/01 00:08:34 fetching corpus: 2095, signal 148800/169328 (executing program) 1970/01/01 00:08:36 fetching corpus: 2145, signal 149917/170455 (executing program) 1970/01/01 00:08:38 fetching corpus: 2195, signal 151145/171573 (executing program) 1970/01/01 00:08:42 fetching corpus: 2245, signal 152718/172847 (executing program) 1970/01/01 00:08:44 fetching corpus: 2293, signal 153606/173758 (executing program) 1970/01/01 00:08:47 fetching corpus: 2343, signal 154658/174772 (executing program) 1970/01/01 00:08:49 fetching corpus: 2393, signal 156456/176027 (executing program) 1970/01/01 00:08:51 fetching corpus: 2443, signal 157472/176888 (executing program) 1970/01/01 00:08:55 fetching corpus: 2493, signal 158474/177754 (executing program) 1970/01/01 00:08:57 fetching corpus: 2543, signal 159497/178632 (executing program) 1970/01/01 00:09:00 fetching corpus: 2593, signal 160504/179472 (executing program) 1970/01/01 00:09:03 fetching corpus: 2643, signal 161470/180278 (executing program) 1970/01/01 00:09:05 fetching corpus: 2693, signal 162649/181103 (executing program) 1970/01/01 00:09:08 fetching corpus: 2742, signal 163501/181810 (executing program) 1970/01/01 00:09:11 fetching corpus: 2791, signal 164447/182559 (executing program) 1970/01/01 00:09:13 fetching corpus: 2841, signal 165374/183219 (executing program) 1970/01/01 00:09:16 fetching corpus: 2891, signal 166351/183910 (executing program) 1970/01/01 00:09:18 fetching corpus: 2941, signal 167146/184484 (executing program) 1970/01/01 00:09:20 fetching corpus: 2991, signal 168262/185165 (executing program) 1970/01/01 00:09:22 fetching corpus: 3041, signal 169071/185730 (executing program) 1970/01/01 00:09:25 fetching corpus: 3091, signal 170447/186484 (executing program) 1970/01/01 00:09:27 fetching corpus: 3141, signal 171313/187042 (executing program) 1970/01/01 00:09:31 fetching corpus: 3191, signal 172316/187633 (executing program) 1970/01/01 00:09:33 fetching corpus: 3241, signal 173095/188116 (executing program) 1970/01/01 00:09:36 fetching corpus: 3291, signal 173799/188564 (executing program) 1970/01/01 00:09:39 fetching corpus: 3341, signal 174443/188933 (executing program) 1970/01/01 00:09:41 fetching corpus: 3390, signal 175046/189307 (executing program) 1970/01/01 00:09:43 fetching corpus: 3439, signal 175601/189672 (executing program) 1970/01/01 00:09:44 fetching corpus: 3489, signal 176517/190133 (executing program) 1970/01/01 00:09:47 fetching corpus: 3539, signal 176922/190440 (executing program) 1970/01/01 00:09:50 fetching corpus: 3588, signal 177726/190814 (executing program) 1970/01/01 00:09:52 fetching corpus: 3638, signal 178488/191196 (executing program) 1970/01/01 00:09:55 fetching corpus: 3688, signal 179418/191572 (executing program) 1970/01/01 00:09:59 fetching corpus: 3738, signal 181218/192169 (executing program) 1970/01/01 00:10:00 fetching corpus: 3788, signal 181882/192468 (executing program) 1970/01/01 00:10:03 fetching corpus: 3838, signal 182766/192755 (executing program) 1970/01/01 00:10:07 fetching corpus: 3888, signal 183407/193010 (executing program) 1970/01/01 00:10:09 fetching corpus: 3938, signal 183964/193244 (executing program) 1970/01/01 00:10:13 fetching corpus: 3988, signal 184853/193511 (executing program) 1970/01/01 00:10:15 fetching corpus: 4038, signal 185582/193716 (executing program) 1970/01/01 00:10:18 fetching corpus: 4087, signal 186125/193862 (executing program) 1970/01/01 00:10:21 fetching corpus: 4137, signal 186656/194011 (executing program) 1970/01/01 00:10:23 fetching corpus: 4186, signal 187465/194203 (executing program) 1970/01/01 00:10:25 fetching corpus: 4236, signal 188102/194362 (executing program) 1970/01/01 00:10:27 fetching corpus: 4286, signal 188636/194487 (executing program) 1970/01/01 00:10:30 fetching corpus: 4336, signal 189160/194629 (executing program) 1970/01/01 00:10:31 fetching corpus: 4385, signal 189629/194752 (executing program) 1970/01/01 00:10:34 fetching corpus: 4435, signal 190271/194858 (executing program) 1970/01/01 00:10:37 fetching corpus: 4485, signal 190908/194959 (executing program) 1970/01/01 00:10:39 fetching corpus: 4535, signal 191458/195033 (executing program) 1970/01/01 00:10:41 fetching corpus: 4585, signal 191858/195080 (executing program) 1970/01/01 00:10:44 fetching corpus: 4635, signal 192362/195123 (executing program) 1970/01/01 00:10:44 fetching corpus: 4638, signal 192394/195151 (executing program) 1970/01/01 00:10:45 fetching corpus: 4638, signal 192394/195183 (executing program) 1970/01/01 00:10:45 fetching corpus: 4638, signal 192394/195218 (executing program) 1970/01/01 00:10:45 fetching corpus: 4638, signal 192394/195235 (executing program) 1970/01/01 00:10:45 fetching corpus: 4638, signal 192394/195235 (executing program) 1970/01/01 00:12:38 starting 2 fuzzer processes 00:12:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x8, 0x3, 0x478, 0xd8, 0xffffffff, 0xffffffff, 0xd8, 0xffffffff, 0x3e0, 0xffffffff, 0xffffffff, 0x3e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x11, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x2a0, 0x308, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x12}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4d8) 00:12:38 executing program 1: setreuid(0xee00, 0x0) r0 = getuid() setreuid(0xee00, r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCDARP(r2, 0x8953, 0x0) [ 788.498819][ T2045] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 789.040039][ T2045] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 790.027866][ T2047] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 790.512150][ T2047] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 799.962606][ T2045] device hsr_slave_0 entered promiscuous mode [ 800.001142][ T2045] device hsr_slave_1 entered promiscuous mode [ 801.459543][ T2047] device hsr_slave_0 entered promiscuous mode [ 801.483426][ T2047] device hsr_slave_1 entered promiscuous mode [ 801.511010][ T2047] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 801.527827][ T2047] Cannot create hsr debugfs directory [ 808.237203][ T2047] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 808.488997][ T2047] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 808.828043][ T2047] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 809.131588][ T2047] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 809.870025][ T2045] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 810.162158][ T2045] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 810.340765][ T2045] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 810.510231][ T2045] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 819.701280][ T2047] 8021q: adding VLAN 0 to HW filter on device bond0 [ 820.510844][ T2663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 820.583124][ T2663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 821.120632][ T2045] 8021q: adding VLAN 0 to HW filter on device bond0 [ 821.749418][ T2654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 821.789940][ T2654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 827.200553][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 827.310600][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 827.598491][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 827.659644][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 827.929853][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 828.197824][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 828.693729][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 828.729388][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 828.979810][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 829.016610][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 829.138734][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 829.186674][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 829.493163][ T82] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 829.530830][ T82] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 829.569247][ T82] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 829.804112][ T2047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 830.443432][ T2188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 830.873029][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 830.921070][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 831.256526][ T2188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 831.309885][ T2188] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 831.683812][ T2045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 836.399216][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 836.403937][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 836.527803][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 836.530582][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 848.910335][ T82] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 848.971741][ T82] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 850.008706][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 850.063792][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 854.870600][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 854.932558][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 855.079013][ T82] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 855.111482][ T82] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 855.141865][ T2047] device veth0_vlan entered promiscuous mode [ 855.513178][ T2047] device veth1_vlan entered promiscuous mode [ 856.606463][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 856.639249][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 857.087509][ T2047] device veth0_macvtap entered promiscuous mode [ 857.363493][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 857.393505][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 857.421549][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 857.486395][ T2047] device veth1_macvtap entered promiscuous mode [ 857.596600][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 857.628525][ T2107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 857.797297][ T2045] device veth0_vlan entered promiscuous mode [ 858.424128][ T82] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 858.453748][ T82] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 858.551438][ T2045] device veth1_vlan entered promiscuous mode [ 858.958698][ T2188] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 858.983418][ T2188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 859.153874][ T2047] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 859.180965][ T2047] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 859.182014][ T2047] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 859.183011][ T2047] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 860.573068][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 860.671826][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 860.818631][ T2045] device veth0_macvtap entered promiscuous mode [ 861.343166][ T2045] device veth1_macvtap entered promiscuous mode [ 862.479275][ T2045] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 862.481013][ T2045] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 862.482478][ T2045] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 862.483751][ T2045] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 862.570489][ T2188] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 862.602732][ T2188] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 862.623582][ T2188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 862.639821][ T2188] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 862.713537][ T2188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 867.154117][ T2739] xt_bpf: check failed: parse error 00:14:26 executing program 1: setreuid(0xee00, 0x0) r0 = getuid() setreuid(0xee00, r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCDARP(r2, 0x8953, 0x0) 00:14:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x8, 0x3, 0x478, 0xd8, 0xffffffff, 0xffffffff, 0xd8, 0xffffffff, 0x3e0, 0xffffffff, 0xffffffff, 0x3e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x11, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x2a0, 0x308, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x12}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4d8) [ 870.842131][ T2743] xt_bpf: check failed: parse error 00:14:30 executing program 1: setreuid(0xee00, 0x0) r0 = getuid() setreuid(0xee00, r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCDARP(r2, 0x8953, 0x0) 00:14:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x8, 0x3, 0x478, 0xd8, 0xffffffff, 0xffffffff, 0xd8, 0xffffffff, 0x3e0, 0xffffffff, 0xffffffff, 0x3e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x11, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x2a0, 0x308, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x12}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4d8) [ 874.831495][ T2747] xt_bpf: check failed: parse error 00:14:34 executing program 1: setreuid(0xee00, 0x0) r0 = getuid() setreuid(0xee00, r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCDARP(r2, 0x8953, 0x0) 00:14:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x8, 0x3, 0x478, 0xd8, 0xffffffff, 0xffffffff, 0xd8, 0xffffffff, 0x3e0, 0xffffffff, 0xffffffff, 0x3e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x11, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x2a0, 0x308, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x12}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4d8) [ 879.841393][ T2751] xt_bpf: check failed: parse error 00:14:40 executing program 1: setreuid(0xee00, 0x0) r0 = getuid() setreuid(0xee00, r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCDARP(r2, 0x8953, 0x0) 00:14:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000000)=0x100, 0x4) 00:14:46 executing program 1: setreuid(0xee00, 0x0) r0 = getuid() setreuid(0xee00, r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCDARP(r2, 0x8953, 0x0) 00:14:49 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000000)=0x100, 0x4) 00:14:51 executing program 1: setreuid(0xee00, 0x0) r0 = getuid() setreuid(0xee00, r0) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCDARP(r2, 0x8953, 0x0) 00:14:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000000)=0x100, 0x4) 00:14:58 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000), 0xebc, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000080)) 00:14:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000000)=0x100, 0x4) 00:15:02 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000), 0xebc, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000080)) 00:15:04 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000), 0xebc, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000080)) 00:15:05 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000), 0xebc, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000080)) 00:15:07 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000), 0xebc, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000080)) 00:15:09 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000), 0xebc, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000080)) 00:15:10 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000), 0xebc, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r0, 0xc0385720, &(0x7f0000000080)) 00:15:12 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x40, 0x78, 0x0, 0x640}) 00:15:15 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0xc0045004, 0x0) 00:15:16 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x40, 0x78, 0x0, 0x640}) 00:15:19 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0xc0045004, 0x0) 00:15:20 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x40, 0x78, 0x0, 0x640}) 00:15:22 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0xc0045004, 0x0) 00:15:23 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x40, 0x78, 0x0, 0x640}) 00:15:25 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r0, 0xc0045004, 0x0) 00:15:27 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x40, 0x78, 0x0, 0x640}) 00:15:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:15:30 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x40, 0x78, 0x0, 0x640}) [ 933.003586][ T2805] loop0: detected capacity change from 0 to 512 [ 933.177849][ T2805] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 933.177849][ T2805] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 933.177849][ T2805] [ 933.891607][ T2805] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 934.590650][ T26] audit: type=1800 audit(933.390:2): pid=2805 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=15 res=0 errno=0 00:15:33 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x40, 0x78, 0x0, 0x640}) [ 934.966630][ T26] audit: type=1804 audit(933.820:3): pid=2805 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/15/file0/file1" dev="loop0" ino=15 res=1 errno=0 [ 935.755632][ T26] audit: type=1804 audit(934.610:4): pid=2812 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/15/file0/file1" dev="loop0" ino=15 res=1 errno=0 00:15:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:15:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) [ 940.502087][ T2819] loop1: detected capacity change from 0 to 512 [ 940.701857][ T2819] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 940.701857][ T2819] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 940.701857][ T2819] [ 941.257133][ T2819] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 941.293094][ T2820] loop0: detected capacity change from 0 to 512 [ 941.467059][ T2820] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 941.467059][ T2820] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 941.467059][ T2820] [ 941.810032][ T2820] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 941.842926][ T26] audit: type=1800 audit(940.700:5): pid=2819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="loop1" ino=15 res=0 errno=0 [ 942.207275][ T26] audit: type=1804 audit(941.060:6): pid=2819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/18/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 942.393258][ T26] audit: type=1800 audit(941.250:7): pid=2820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=15 res=0 errno=0 [ 942.509397][ T26] audit: type=1804 audit(941.360:8): pid=2820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/16/file0/file1" dev="loop0" ino=15 res=1 errno=0 [ 942.970402][ T26] audit: type=1804 audit(941.830:9): pid=2828 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/18/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 943.331961][ T26] audit: type=1804 audit(942.190:10): pid=2829 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/16/file0/file1" dev="loop0" ino=15 res=1 errno=0 00:15:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$eJzs3M9rHFUcAPDvTH61TetGbaxVwYWCBsRN06ZqwYO5iAdvevSy5BfFbVO6K5i04A/EoyB69VDEi+DJP0CPevXmVS9SCCL+ASuzmUnXdDftdrNuzH4+MOG9ebO878zLm5e8mbcBjKxyRHwYEZMRsRYRpXx/km/x2s6WHff3X7eWsy2JZvOtP5NWeZaPts9kprMfacRcGpF+EvF0h3rrm1vvVmu11Rt5fr5x9fp8fXPrxStXq+ur66vXXrr08uLC5YuXzh/cuT47Pbv5xfU3Ln+29Wlpffmbc1m8J/Oy9vM4KOUo716TvQ7wtA6Fk8MOgIeSRsRYRIy3+n8pxlqpHaX44J2hBgcADESz2RzbkwcAjrzEmA8AI6b4v794tjeI52AcXttLEXGsU/uP7z4Jmhjg871yRCz+dPz7bIsBPYcFAAAAGGU/LkXEK53mf9J4pu24UxHxSL4+YCYiHo2IxyLi8T7rL+/J3zv/k97pswr2sb0U8WrH+d+0OGRmLM+darX9RLJ2pbZ6Pv99mIuJqSy/sE8dN7/9/dduZe3zf9mW1V/MBeZx3Bmf+vdnVqqNaj/nzF3bH0U8Nd6p/ZPd+d8kIk73Ucdvn9e/61Z2//ZnkJq3I57r2P/vrlxK9l2fNd+6HcwXN4UObv8w+3O3+rX/cGX9/8T+7T+TtK/Xq/dex9df3Wp0K3vY+/9k8nYrwMl83/vVRuPGQsRk8ua9+y/0HvNRVVyP4npl7T93rvP4X9zzsws6GxFPRMSZiHgyIs72UOeZs7/c7Fam/w9X1v4rPfX/3hOV51//uFv9D9b/F1vBzOV7/P13fw/aQMOOEwAAAAAAAICDkbbWdidpZTedppXKznd4n44TaW2j3nhhbeO9ays7a8BnYiItXvUqtb0PupC/F1zkL+zJX8zfGf5y6ngrX1neqK0M++QBYERNdxn/M39MDTs6AGBgjg07AADgP2f8B4DRY/wHgNFj/AeA0WP8B4DRY/wHgJHSz/f6S0hIHNXEsO9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/2//BAAA//8Q3dmN") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:15:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) [ 947.497436][ T2835] loop1: detected capacity change from 0 to 512 [ 947.663623][ T2835] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 947.663623][ T2835] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 947.663623][ T2835] [ 948.279431][ T2835] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 948.911870][ T26] audit: type=1800 audit(947.770:11): pid=2835 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="loop1" ino=15 res=0 errno=0 [ 949.116399][ T26] audit: type=1804 audit(947.970:12): pid=2835 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/19/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 949.128261][ T2839] loop0: detected capacity change from 0 to 512 [ 949.320861][ T2839] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 949.320861][ T2839] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 949.320861][ T2839] [ 949.727614][ T2839] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 949.845945][ T26] audit: type=1804 audit(948.700:13): pid=2845 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/19/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 950.493727][ T26] audit: type=1800 audit(949.350:14): pid=2839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=15 res=0 errno=0 [ 950.737788][ T26] audit: type=1804 audit(949.590:15): pid=2839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/17/file0/file1" dev="loop0" ino=15 res=1 errno=0 [ 951.406741][ T26] audit: type=1804 audit(950.260:16): pid=2846 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/17/file0/file1" dev="loop0" ino=15 res=1 errno=0 00:15:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:15:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) [ 954.234025][ T2852] loop1: detected capacity change from 0 to 512 [ 954.506943][ T2852] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 954.506943][ T2852] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 954.506943][ T2852] [ 955.103837][ T2852] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 955.839660][ T26] audit: type=1800 audit(954.700:17): pid=2852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="loop1" ino=15 res=0 errno=0 [ 955.860947][ T2857] loop0: detected capacity change from 0 to 512 [ 956.082181][ T2857] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 956.082181][ T2857] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 956.082181][ T2857] [ 956.315330][ T26] audit: type=1804 audit(955.150:18): pid=2852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/20/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 956.580690][ T2857] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 957.009973][ T26] audit: type=1804 audit(955.870:19): pid=2862 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/20/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 957.342944][ T26] audit: type=1800 audit(956.200:20): pid=2857 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=15 res=0 errno=0 [ 957.417302][ T26] audit: type=1804 audit(956.270:21): pid=2857 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/18/file0/file1" dev="loop0" ino=15 res=1 errno=0 [ 958.089098][ T26] audit: type=1804 audit(956.940:22): pid=2863 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/18/file0/file1" dev="loop0" ino=15 res=1 errno=0 00:15:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:16:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) [ 963.781465][ T2867] loop1: detected capacity change from 0 to 512 [ 963.949836][ T2867] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 963.949836][ T2867] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 963.949836][ T2867] [ 964.753442][ T2867] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 964.890600][ T2874] loop0: detected capacity change from 0 to 512 [ 965.011637][ T2874] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 965.011637][ T2874] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 965.011637][ T2874] [ 965.337503][ T26] audit: type=1800 audit(964.190:23): pid=2867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="loop1" ino=15 res=0 errno=0 [ 965.373336][ T2874] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 965.482269][ T26] audit: type=1804 audit(964.340:24): pid=2867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/21/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 965.938099][ T26] audit: type=1800 audit(964.790:25): pid=2874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=15 res=0 errno=0 [ 966.143966][ T26] audit: type=1804 audit(965.000:27): pid=2874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/19/file0/file1" dev="loop0" ino=15 res=1 errno=0 [ 966.148625][ T26] audit: type=1804 audit(964.960:26): pid=2879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/21/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 966.877528][ T26] audit: type=1804 audit(965.730:28): pid=2880 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/19/file0/file1" dev="loop0" ino=15 res=1 errno=0 00:16:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$eJzs3M9rHFUcAPDvTH61TetGbaxVwYWCBsRN06ZqwYO5iAdvevSy5BfFbVO6K5i04A/EoyB69VDEi+DJP0CPevXmVS9SCCL+ASuzmUnXdDftdrNuzH4+MOG9ebO878zLm5e8mbcBjKxyRHwYEZMRsRYRpXx/km/x2s6WHff3X7eWsy2JZvOtP5NWeZaPts9kprMfacRcGpF+EvF0h3rrm1vvVmu11Rt5fr5x9fp8fXPrxStXq+ur66vXXrr08uLC5YuXzh/cuT47Pbv5xfU3Ln+29Wlpffmbc1m8J/Oy9vM4KOUo716TvQ7wtA6Fk8MOgIeSRsRYRIy3+n8pxlqpHaX44J2hBgcADESz2RzbkwcAjrzEmA8AI6b4v794tjeI52AcXttLEXGsU/uP7z4Jmhjg871yRCz+dPz7bIsBPYcFAAAAGGU/LkXEK53mf9J4pu24UxHxSL4+YCYiHo2IxyLi8T7rL+/J3zv/k97pswr2sb0U8WrH+d+0OGRmLM+darX9RLJ2pbZ6Pv99mIuJqSy/sE8dN7/9/dduZe3zf9mW1V/MBeZx3Bmf+vdnVqqNaj/nzF3bH0U8Nd6p/ZPd+d8kIk73Ucdvn9e/61Z2//ZnkJq3I57r2P/vrlxK9l2fNd+6HcwXN4UObv8w+3O3+rX/cGX9/8T+7T+TtK/Xq/dex9df3Wp0K3vY+/9k8nYrwMl83/vVRuPGQsRk8ua9+y/0HvNRVVyP4npl7T93rvP4X9zzsws6GxFPRMSZiHgyIs72UOeZs7/c7Fam/w9X1v4rPfX/3hOV51//uFv9D9b/F1vBzOV7/P13fw/aQMOOEwAAAAAAAICDkbbWdidpZTedppXKznd4n44TaW2j3nhhbeO9ays7a8BnYiItXvUqtb0PupC/F1zkL+zJX8zfGf5y6ngrX1neqK0M++QBYERNdxn/M39MDTs6AGBgjg07AADgP2f8B4DRY/wHgNFj/AeA0WP8B4DRY/wHgJHSz/f6S0hIHNXEsO9MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/2//BAAA//8Q3dmN") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:16:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) [ 971.103742][ T2886] loop0: detected capacity change from 0 to 512 [ 971.223153][ T2886] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 971.223153][ T2886] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 971.223153][ T2886] [ 972.227075][ T2886] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 972.321303][ T2890] loop1: detected capacity change from 0 to 512 [ 972.422543][ T2890] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 972.422543][ T2890] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 972.422543][ T2890] [ 972.717716][ T26] audit: type=1800 audit(971.580:29): pid=2886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=15 res=0 errno=0 [ 972.981544][ T26] audit: type=1804 audit(971.840:30): pid=2886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/20/file0/file1" dev="loop0" ino=15 res=1 errno=0 [ 972.990838][ T2890] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 973.623024][ T26] audit: type=1800 audit(972.480:31): pid=2890 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="loop1" ino=15 res=0 errno=0 [ 973.891753][ T26] audit: type=1804 audit(972.690:32): pid=2890 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/22/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 974.109453][ T26] audit: type=1804 audit(972.900:33): pid=2896 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/20/file0/file1" dev="loop0" ino=15 res=1 errno=0 [ 974.549897][ T26] audit: type=1804 audit(973.400:34): pid=2897 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/22/file0/file1" dev="loop1" ino=15 res=1 errno=0 00:16:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:16:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) [ 978.709606][ T2901] loop1: detected capacity change from 0 to 512 [ 978.862501][ T2901] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 978.862501][ T2901] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 978.862501][ T2901] [ 979.498371][ T2901] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 980.000279][ T26] audit: type=1800 audit(978.860:35): pid=2901 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="loop1" ino=15 res=0 errno=0 [ 980.173913][ T26] audit: type=1804 audit(979.030:36): pid=2901 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/23/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 980.618872][ T2909] loop0: detected capacity change from 0 to 512 [ 980.803760][ T2909] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 980.803760][ T2909] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 980.803760][ T2909] [ 981.259888][ T2909] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 981.391594][ T26] audit: type=1804 audit(980.250:37): pid=2913 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/23/file0/file1" dev="loop1" ino=15 res=1 errno=0 [ 981.847003][ T26] audit: type=1800 audit(980.700:38): pid=2909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=15 res=0 errno=0 [ 981.928944][ T26] audit: type=1804 audit(980.780:39): pid=2909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/21/file0/file1" dev="loop0" ino=15 res=1 errno=0 [ 982.671144][ T26] audit: type=1804 audit(981.530:40): pid=2914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir544210935/syzkaller.1wDWDI/21/file0/file1" dev="loop0" ino=15 res=1 errno=0 00:16:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:16:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) [ 987.942855][ T2920] loop1: detected capacity change from 0 to 512 [ 988.383371][ T2920] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 988.383371][ T2920] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 988.383371][ T2920] [ 989.042114][ T2920] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 989.820159][ T26] audit: type=1800 audit(988.670:41): pid=2920 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="loop1" ino=15 res=0 errno=0 [ 990.025580][ T26] audit: type=1804 audit(988.880:42): pid=2920 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/24/file0/file1" dev="loop1" ino=15 res=1 errno=0 00:16:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) [ 990.899236][ T26] audit: type=1804 audit(989.760:43): pid=2929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/24/file0/file1" dev="loop1" ino=15 res=1 errno=0 00:16:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:16:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) [ 996.361585][ T2937] loop1: detected capacity change from 0 to 512 [ 996.651633][ T2937] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 996.651633][ T2937] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 996.651633][ T2937] [ 996.947666][ T2937] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 997.080166][ T26] audit: type=1800 audit(995.940:44): pid=2937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="loop1" ino=15 res=0 errno=0 [ 997.187141][ T26] audit: type=1804 audit(996.030:45): pid=2937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/25/file0/file1" dev="loop1" ino=15 res=1 errno=0 00:16:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) [ 998.109052][ T26] audit: type=1804 audit(996.970:46): pid=2942 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/25/file0/file1" dev="loop1" ino=15 res=1 errno=0 00:16:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000180)={[{@noauto_da_alloc}, {@nouser_xattr}]}, 0x1, 0x3db, &(0x7f00000004c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x10e042, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x7ffffffd) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0xa6e02, 0x0) 00:16:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) [ 1005.641934][ T2948] loop1: detected capacity change from 0 to 512 [ 1005.918611][ T2948] EXT4-fs: Mount option "nouser_xattr" will be removed by 3.5 [ 1005.918611][ T2948] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 1005.918611][ T2948] [ 1006.493485][ T2948] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 1007.592878][ T26] audit: type=1800 audit(1006.450:47): pid=2948 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="loop1" ino=15 res=0 errno=0 [ 1008.157493][ T26] audit: type=1804 audit(1007.010:48): pid=2948 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/26/file0/file1" dev="loop1" ino=15 res=1 errno=0 00:16:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) [ 1009.166097][ T26] audit: type=1804 audit(1008.020:49): pid=2955 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir4130979785/syzkaller.haTgUM/26/file0/file1" dev="loop1" ino=15 res=1 errno=0 00:16:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) 00:16:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) 00:16:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) 00:17:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) 00:17:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) 00:17:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) 00:17:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) 00:17:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) 00:17:11 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) 00:17:15 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5421, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r6}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r7, 0x800454cf, 0x0) write$binfmt_elf32(r7, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfa, 0x8, 0x1, 0x1, 0x6, 0x3, 0x3e, 0x5, 0x1d8, 0x38, 0x153, 0x2, 0x3, 0x20, 0x1, 0x9, 0xcb, 0x7}, [{0x5, 0x4, 0x8000, 0x40000000, 0x7, 0x6, 0x0, 0x2}], "82f67e5e6b6c347491a1fca6c6d01ac0dc594cbf048579f4d523ae7984bdb7dce03272083218bc3e1bd9f3a620ca3b3ea376ed1e823a3c4b0868fd62279c9eb38285498bfa2c3fec0889306d2f6566896b6d88e30b499da532ba66c1264af6cb889998f76089483ca5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6c1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl1\x00', r6, 0x29, 0x7, 0x5, 0x4, 0x8, @remote, @mcast2, 0x7800, 0x40, 0x4f9, 0x3f}}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30000000150010002bbd7000ffdbdf250a3f4800", @ANYRES32=r6, @ANYBLOB="080009000200000039000a00040000000800090004000000"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x4000001) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x800}, [@IFLA_CARRIER={0x5, 0x21, 0xf}]}, 0x28}}, 0x0) 00:17:19 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:22 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:23 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:26 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:27 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:29 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:29 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:32 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:32 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:34 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:36 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000002100), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r0, 0x4144, 0x0) 00:17:37 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000380)={0x2, 0x0, 0xc1c2, 0x39f3}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 00:17:38 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000002100), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r0, 0x4144, 0x0) 00:17:40 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000002100), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r0, 0x4144, 0x0) 00:17:43 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000002100), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r0, 0x4144, 0x0) 00:17:44 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000002100), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r0, 0x4144, 0x0) 00:17:45 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000002100), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r0, 0x4144, 0x0) 00:17:47 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r0) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 00:17:48 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000002100), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_UNLINK(r0, 0x4144, 0x0) 00:17:50 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r0) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 00:17:53 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:17:53 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r0) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 00:17:56 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r0) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 00:17:58 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:18:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:18:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:18:05 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:18:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:18:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:18:09 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:18:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:18:14 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:18:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:18:18 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:18:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x21, &(0x7f00000006c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000640)={0x8, 'syz_tun\x00', {'veth0_to_bridge\x00'}, 0x6}) connect$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={0x1d, r3, 0x1, {0x0, 0xf0, 0x4}, 0xff}, 0x18) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x8001, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000005c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl2\x00', r3, 0x29, 0x0, 0xfe, 0x4, 0x4f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @remote}, 0x8000, 0x20, 0x0, 0x3}}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x488, 0x0, 0x370, 0xffffffff, 0x370, 0x0, 0x490, 0x490, 0xffffffff, 0x490, 0x490, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast2, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @gre_key}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'macvlan1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@dev, @ipv6=@dev, @gre_key}}}, {{@ipv6={@mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'team_slave_1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@dev, @ipv6=@remote, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "8e6fc44ef8bc575cef1aaacbcde81d6860771e108363089da9e7fc84fe69"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4e8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @local}, 0x1c) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000cc0)) sendmmsg$sock(r5, &(0x7f0000003100)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20004890) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r2, r4}) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000c80)={'ip6_vti0\x00', &(0x7f0000000c00)={'syztnl0\x00', r3, 0x29, 0x6b, 0x3f, 0x20, 0x40, @mcast2, @private2, 0x8000, 0x1, 0x8, 0x2}}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f0000000bc0)={0x0, 'wg1\x00', {0x2}, 0x7}) 00:18:21 executing program 1: shmget(0x0, 0x3000, 0x54001684, &(0x7f0000ffc000/0x3000)=nil) 00:18:25 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) 00:18:25 executing program 1: shmget(0x0, 0x3000, 0x54001684, &(0x7f0000ffc000/0x3000)=nil) 00:18:27 executing program 1: shmget(0x0, 0x3000, 0x54001684, &(0x7f0000ffc000/0x3000)=nil) 00:18:30 executing program 1: shmget(0x0, 0x3000, 0x54001684, &(0x7f0000ffc000/0x3000)=nil) 00:18:31 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) 00:18:33 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) 00:18:36 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) 00:18:40 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) 00:18:41 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) 00:18:47 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) 00:18:51 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) 00:18:54 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) 00:18:59 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) 00:19:02 executing program 0: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) [ 1144.098882][ T3125] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 1144.103803][ T3125] [ 1144.104480][ T3125] ====================================================== [ 1144.105444][ T3125] WARNING: possible circular locking dependency detected [ 1144.106268][ T3125] 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 Not tainted [ 1144.107176][ T3125] ------------------------------------------------------ [ 1144.108258][ T3125] syz-executor.1/3125 is trying to acquire lock: [ 1144.109663][ T3125] ffffffff84fc0408 (nci_mutex){+.+.}-{3:3}, at: virtual_nci_close+0x28/0x58 [ 1144.112047][ T3125] [ 1144.112047][ T3125] but task is already holding lock: [ 1144.112751][ T3125] ffffaf800f945350 (&ndev->req_lock){+.+.}-{3:3}, at: nci_close_device+0x52/0x1de [ 1144.114642][ T3125] [ 1144.114642][ T3125] which lock already depends on the new lock. [ 1144.114642][ T3125] [ 1144.115994][ T3125] [ 1144.115994][ T3125] the existing dependency chain (in reverse order) is: [ 1144.117421][ T3125] [ 1144.117421][ T3125] -> #3 (&ndev->req_lock){+.+.}-{3:3}: [ 1144.118726][ T3125] lock_acquire.part.0+0x1d0/0x424 [ 1144.119989][ T3125] lock_acquire+0x54/0x6a [ 1144.120813][ T3125] __mutex_lock+0x114/0xade [ 1144.121722][ T3125] mutex_lock_nested+0x14/0x1c [ 1144.122836][ T3125] nci_start_poll+0x4de/0x6b8 [ 1144.123606][ T3125] nfc_start_poll+0x10c/0x1e8 [ 1144.124409][ T3125] nfc_genl_start_poll+0xfe/0x252 [ 1144.125561][ T3125] genl_family_rcv_msg_doit+0x19a/0x23c [ 1144.126400][ T3125] genl_rcv_msg+0x236/0x3ba [ 1144.127198][ T3125] netlink_rcv_skb+0xf8/0x2be [ 1144.127946][ T3125] genl_rcv+0x36/0x4c [ 1144.128639][ T3125] netlink_unicast+0x40e/0x5fe [ 1144.129389][ T3125] netlink_sendmsg+0x4e0/0x994 [ 1144.130415][ T3125] sock_sendmsg+0xa0/0xc4 [ 1144.131264][ T3125] ____sys_sendmsg+0x46e/0x484 [ 1144.132095][ T3125] ___sys_sendmsg+0x16c/0x1f6 [ 1144.133028][ T3125] __sys_sendmsg+0xba/0x150 [ 1144.133725][ T3125] sys_sendmsg+0x2c/0x3a [ 1144.135012][ T3125] ret_from_syscall+0x0/0x2 [ 1144.136340][ T3125] [ 1144.136340][ T3125] -> #2 (&genl_data->genl_data_mutex){+.+.}-{3:3}: [ 1144.137742][ T3125] lock_acquire.part.0+0x1d0/0x424 [ 1144.138570][ T3125] lock_acquire+0x54/0x6a [ 1144.139434][ T3125] __mutex_lock+0x114/0xade [ 1144.140248][ T3125] mutex_lock_nested+0x14/0x1c [ 1144.141125][ T3125] nfc_urelease_event_work+0x126/0x218 [ 1144.142126][ T3125] process_one_work+0x654/0xffe [ 1144.142901][ T3125] worker_thread+0x360/0x8fa [ 1144.144115][ T3125] kthread+0x19e/0x1fa [ 1144.144936][ T3125] ret_from_exception+0x0/0x10 [ 1144.145818][ T3125] [ 1144.145818][ T3125] -> #1 (nfc_devlist_mutex){+.+.}-{3:3}: [ 1144.147058][ T3125] lock_acquire.part.0+0x1d0/0x424 [ 1144.147838][ T3125] lock_acquire+0x54/0x6a [ 1144.149054][ T3125] __mutex_lock+0x114/0xade [ 1144.150044][ T3125] mutex_lock_nested+0x14/0x1c [ 1144.151202][ T3125] nfc_register_device+0x44/0x29e [ 1144.152117][ T3125] nci_register_device+0x538/0x612 [ 1144.152932][ T3125] virtual_ncidev_open+0x82/0x12c [ 1144.154236][ T3125] misc_open+0x272/0x2c8 [ 1144.155105][ T3125] chrdev_open+0x1d4/0x478 [ 1144.155873][ T3125] do_dentry_open+0x2a4/0x7d4 [ 1144.157077][ T3125] vfs_open+0x52/0x5e [ 1144.157960][ T3125] path_openat+0x12b6/0x189e [ 1144.158653][ T3125] do_filp_open+0x10e/0x22a [ 1144.159441][ T3125] do_sys_openat2+0x174/0x31e [ 1144.160804][ T3125] sys_openat+0xdc/0x164 [ 1144.161710][ T3125] ret_from_syscall+0x0/0x2 [ 1144.162449][ T3125] [ 1144.162449][ T3125] -> #0 (nci_mutex){+.+.}-{3:3}: [ 1144.163695][ T3125] check_noncircular+0x1de/0x1fe [ 1144.164980][ T3125] __lock_acquire+0x19a4/0x333e [ 1144.165824][ T3125] lock_acquire.part.0+0x1d0/0x424 [ 1144.166640][ T3125] lock_acquire+0x54/0x6a [ 1144.167835][ T3125] __mutex_lock+0x114/0xade [ 1144.168774][ T3125] mutex_lock_nested+0x14/0x1c [ 1144.169578][ T3125] virtual_nci_close+0x28/0x58 [ 1144.170817][ T3125] nci_close_device+0x12e/0x1de [ 1144.171724][ T3125] nci_unregister_device+0x34/0x182 [ 1144.172514][ T3125] virtual_ncidev_close+0x9c/0xbc [ 1144.173788][ T3125] __fput+0x164/0x502 [ 1144.174820][ T3125] ____fput+0x1a/0x24 [ 1144.175578][ T3125] task_work_run+0xdc/0x154 [ 1144.176319][ T3125] do_notify_resume+0x894/0xa56 [ 1144.177435][ T3125] ret_from_exception+0x0/0x10 [ 1144.178258][ T3125] [ 1144.178258][ T3125] other info that might help us debug this: [ 1144.178258][ T3125] [ 1144.179029][ T3125] Chain exists of: [ 1144.179029][ T3125] nci_mutex --> &genl_data->genl_data_mutex --> &ndev->req_lock [ 1144.179029][ T3125] [ 1144.180985][ T3125] Possible unsafe locking scenario: [ 1144.180985][ T3125] [ 1144.181741][ T3125] CPU0 CPU1 [ 1144.182762][ T3125] ---- ---- [ 1144.183306][ T3125] lock(&ndev->req_lock); [ 1144.184074][ T3125] lock(&genl_data->genl_data_mutex); [ 1144.185684][ T3125] lock(&ndev->req_lock); [ 1144.186667][ T3125] lock(nci_mutex); [ 1144.187372][ T3125] [ 1144.187372][ T3125] *** DEADLOCK *** [ 1144.187372][ T3125] [ 1144.188713][ T3125] 1 lock held by syz-executor.1/3125: [ 1144.191599][ T3125] #0: ffffaf800f945350 (&ndev->req_lock){+.+.}-{3:3}, at: nci_close_device+0x52/0x1de [ 1144.193896][ T3125] [ 1144.193896][ T3125] stack backtrace: [ 1144.195004][ T3125] CPU: 0 PID: 3125 Comm: syz-executor.1 Not tainted 5.17.0-rc1-syzkaller-00002-g0966d385830d #0 [ 1144.196006][ T3125] Hardware name: riscv-virtio,qemu (DT) [ 1144.197011][ T3125] Call Trace: [ 1144.197541][ T3125] [] dump_backtrace+0x2e/0x3c [ 1144.198462][ T3125] [] show_stack+0x34/0x40 [ 1144.199360][ T3125] [] dump_stack_lvl+0xe4/0x150 [ 1144.200264][ T3125] [] dump_stack+0x1c/0x24 [ 1144.201700][ T3125] [] print_circular_bug+0x34e/0x3d8 [ 1144.202800][ T3125] [] check_noncircular+0x1de/0x1fe [ 1144.203716][ T3125] [] __lock_acquire+0x19a4/0x333e [ 1144.205241][ T3125] [] lock_acquire.part.0+0x1d0/0x424 [ 1144.206387][ T3125] [] lock_acquire+0x54/0x6a [ 1144.207835][ T3125] [] __mutex_lock+0x114/0xade [ 1144.208869][ T3125] [] mutex_lock_nested+0x14/0x1c [ 1144.209774][ T3125] [] virtual_nci_close+0x28/0x58 [ 1144.210803][ T3125] [] nci_close_device+0x12e/0x1de [ 1144.211899][ T3125] [] nci_unregister_device+0x34/0x182 [ 1144.212975][ T3125] [] virtual_ncidev_close+0x9c/0xbc [ 1144.213864][ T3125] [] __fput+0x164/0x502 [ 1144.215140][ T3125] [] ____fput+0x1a/0x24 [ 1144.216113][ T3125] [] task_work_run+0xdc/0x154 [ 1144.217454][ T3125] [] do_notify_resume+0x894/0xa56 [ 1144.218394][ T3125] [] ret_from_exception+0x0/0x10 00:19:03 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) 00:19:05 executing program 1: r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) write$nci(r0, &(0x7f0000000580)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000640)=@NCI_OP_CORE_SET_CONFIG_RSP, 0x5) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) read$nci(r0, &(0x7f0000000840)=""/100, 0x64) write$nci(r0, &(0x7f00000008c0)=@NCI_OP_CORE_CONN_CREATE_RSP={0x0, 0x0, 0x2, 0x4, 0x0, {0x0, 0x0, 0x0, 0x1}}, 0x7) 00:19:06 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0}) [ 1152.106160][ T3140] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 00:19:11 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0}) 00:19:11 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0}) 00:19:12 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0}) 00:19:12 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0}) 00:19:13 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0}) 00:19:13 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0}) 00:19:14 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0}) 00:19:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x6}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 00:19:15 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0}) 00:19:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x6}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 00:19:16 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0}) 00:19:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x6}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 00:19:17 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000980), r0) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14, r1, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 00:19:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0x6}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 00:19:18 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000980), r0) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14, r1, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 00:19:19 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000980), r0) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14, r1, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 00:19:19 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000980), r0) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14, r1, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 00:19:20 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000980), r0) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14, r1, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 00:19:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000980), r0) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14, r1, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 00:19:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000980), r0) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14, r1, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 00:19:22 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000980), r0) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14, r1, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 00:19:23 executing program 0: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4022132, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2abf, &(0x7f0000000200), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 00:19:23 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000980), r0) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14, r1, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 00:19:23 executing program 0: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4022132, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2abf, &(0x7f0000000200), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 00:19:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000980), r0) sendmsg$NFC_CMD_DISABLE_SE(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x14, r1, 0x1, 0x0, 0x0, {0x11}}, 0x14}}, 0x0) 00:19:24 executing program 0: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4022132, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2abf, &(0x7f0000000200), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 00:19:25 executing program 1: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4022132, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2abf, &(0x7f0000000200), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 00:19:26 executing program 0: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4022132, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2abf, &(0x7f0000000200), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 00:19:26 executing program 1: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4022132, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2abf, &(0x7f0000000200), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 00:19:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@private2, 0x0, r2}) 00:19:28 executing program 1: mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x4022132, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x2abf, &(0x7f0000000200), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 00:19:29 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@private2, 0x0, r2}) 00:19:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@private2, 0x0, r2}) 00:19:30 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@private2, 0x0, r2}) 00:19:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@private2, 0x0, r2}) 00:19:31 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@private2, 0x0, r2}) 00:19:31 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@private2, 0x0, r2}) 00:19:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@private2, 0x0, r2}) 00:19:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) fcntl$lock(r0, 0x26, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, r1}) VM DIAGNOSIS: 23:15:20 Registers: info registers vcpu 0 pc ffffffff8011edb6 mhartid 0000000000000000 mstatus 00000000000000a0 mip 00000000000000a0 mie 000000000000022a mideleg 0000000000000222 medeleg 000000000000b109 mtvec 0000000080000540 stvec ffffffff800055d4 mepc ffffffff80475986 sepc ffffffff831afd22 mcause 8000000000000007 scause 8000000000000005 mtval 0000000000000000 stval 0000000000000000 x0/zero 0000000000000000 x1/ra ffffffff8011eda6 x2/sp ffffaf800eb2b180 x3/gp ffffffff85863ac0 x4/tp ffffaf800b1b48c0 x5/t0 ffffffff86bcb657 x6/t1 fffffffef0d796ca x7/t2 0000000000000000 x8/s0 ffffaf800eb2b360 x9/s1 0000000000000000 x10/a0 0000000000000046 x11/a1 00000000000f0000 x12/a2 0000000000000002 x13/a3 ffffffff8011c8a6 x14/a4 70d639d079819000 x15/a5 0000000000000020 x16/a6 ffffffff86bcb686 x17/a7 ffffffff86bcb656 x18/s2 0000000000000046 x19/s3 000000000000000f x20/s4 ffffaf800eb2b2e0 x21/s5 ffffaf800eb2b200 x22/s6 ffffffff8588c1a0 x23/s7 ffffffff8588c3e0 x24/s8 ffffffff8588c220 x25/s9 ffffffff84a88520 x26/s10 ffffffff858655c0 x27/s11 ffffaf800eb2b2e0 x28/t3 0000000000000073 x29/t4 fffffffef0d796c8 x30/t5 fffffffef0d796cb x31/t6 ffffffff86bcb657 f0/ft0 0000000000000000 f1/ft1 0000000000000000 f2/ft2 0000000000000000 f3/ft3 0000000000000000 f4/ft4 0000000000000000 f5/ft5 0000000000000000 f6/ft6 0000000000000000 f7/ft7 0000000000000000 f8/fs0 0000000000000000 f9/fs1 0000000000000000 f10/fa0 0000000000000000 f11/fa1 0000000000000000 f12/fa2 0000000000000000 f13/fa3 0000000000000000 f14/fa4 0000000000000000 f15/fa5 0000000000000000 f16/fa6 0000000000000000 f17/fa7 0000000000000000 f18/fs2 0000000000000000 f19/fs3 0000000000000000 f20/fs4 0000000000000000 f21/fs5 0000000000000000 f22/fs6 0000000000000000 f23/fs7 0000000000000000 f24/fs8 0000000000000000 f25/fs9 0000000000000000 f26/fs10 0000000000000000 f27/fs11 0000000000000000 f28/ft8 0000000000000000 f29/ft9 0000000000000000 f30/ft10 0000000000000000 f31/ft11 0000000000000000 info registers vcpu 1 pc ffffffff802377aa mhartid 0000000000000001 mstatus 00000000000000a2 mip 0000000000000000 mie 00000000000002aa mideleg 0000000000000222 medeleg 000000000000b109 mtvec 0000000080000540 stvec ffffffff800055d4 mepc ffffffff8000f97e sepc 00000000000554b4 mcause 0000000000000009 scause 0000000000000008 mtval 0000000000000000 stval 0000000000000000 x0/zero 0000000000000000 x1/ra ffffffff803ccf70 x2/sp ffffaf800c593bb0 x3/gp ffffffff85863ac0 x4/tp ffffaf80093c6100 x5/t0 0000000000000398 x6/t1 0000000064000000 x7/t2 00007fffcc53a1b7 x8/s0 ffffaf800c593ca0 x9/s1 ffffffff84ddc1a0 x10/a0 ffffffff84ddc1a0 x11/a1 0000000000000007 x12/a2 1ffffffff09bb834 x13/a3 ffffffff80be1fc8 x14/a4 dfffffff00000000 x15/a5 0000000000000000 x16/a6 0000000000f00000 x17/a7 0000000000000073 x18/s2 00007ffffffffff0 x19/s3 ffffaf800c593d60 x20/s4 00007fffcc53a3d8 x21/s5 ffffffff85889780 x22/s6 00007fffcc53a3d8 x23/s7 ffffffff85889780 x24/s8 1ffff5f0018b27c0 x25/s9 ffffffff836465e0 x26/s10 ffffffff83646610 x27/s11 ffffaf800c593e20 x28/t3 000000007fffffff x29/t4 fffff5ef018b27ac x30/t5 fffff5ef018b27ae x31/t6 0000000000040000 f0/ft0 0000000000000000 f1/ft1 0000000000000000 f2/ft2 0000000000000000 f3/ft3 0000000000000000 f4/ft4 0000000000000000 f5/ft5 0000000000000000 f6/ft6 0000000000000000 f7/ft7 0000000000000000 f8/fs0 0000000000000000 f9/fs1 0000000000000000 f10/fa0 0000000000000000 f11/fa1 0000000000000000 f12/fa2 0000000000000000 f13/fa3 0000000000000000 f14/fa4 0000000000000000 f15/fa5 0000000000000000 f16/fa6 0000000000000000 f17/fa7 0000000000000000 f18/fs2 0000000000000000 f19/fs3 0000000000000000 f20/fs4 0000000000000000 f21/fs5 0000000000000000 f22/fs6 0000000000000000 f23/fs7 0000000000000000 f24/fs8 0000000000000000 f25/fs9 0000000000000000 f26/fs10 0000000000000000 f27/fs11 0000000000000000 f28/ft8 0000000000000000 f29/ft9 0000000000000000 f30/ft10 0000000000000000 f31/ft11 0000000000000000