cdace497f6d944967c3bb87099269cb7cd39eb4ef121a8673000000000095e2cff240e24bf793000000000000"], 0x3}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a08000000e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x3d0) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000340)={'team0\x00'}) sendmsg$OSF_MSG_ADD(r6, &(0x7f0000000e00)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000440)={0x964, 0x0, 0x5, 0x101, 0x0, 0x0, {0x0, 0x0, 0x5}, [{{0x254, 0x1, {{0x3, 0x8}, 0xc0, 0x9, 0xff, 0x24, 0x11, 'syz0\x00', "1ddd2626fdc486a0bb6b435027e1a718be42ce774d00e9d95e5f945c0c80edc2", "6c671ddc879c33c6fe65992d60b94489a57b9f300e0618fe91d799142cd5e8ad", [{0x1ff, 0x0, {0x3, 0x81}}, {0xd8, 0x101, {0x0, 0x4}}, {0x84e, 0x4, {0x1, 0x6b}}, {0x9b37, 0x373c, {0x1, 0x28fb}}, {0x6, 0x7f, {0x1, 0x3ff}}, {0xa0, 0x8, {0x1, 0x3}}, {0x2ad3, 0xffb, {0x1, 0xfff}}, {0x101, 0x8001, {0x0, 0xfff}}, {0x1, 0x0, {0x2, 0x100000}}, {0x503c, 0xff, {0x3, 0xfffff9b0}}, {0x7ff, 0x3f, {0x0, 0x2}}, {0x37, 0x1, {0x1, 0x9}}, {0xff, 0x1, {0x1, 0x291}}, {0x1, 0x3, {0x1, 0x1ff}}, {0x7, 0x0, {0x2, 0x7fffffff}}, {0x81, 0xfff7, {0x3, 0x1}}, {0xd1c, 0xdc23, {0x2, 0x7fff}}, {0x4, 0xfffc, {0x1, 0x4}}, {0x4, 0x8001, {0x0, 0x10001}}, {0x2, 0xfffc, {0x1, 0x81}}, {0x7, 0x7, {0x3, 0x10000}}, {0x1f, 0xfff, {0x2, 0x7}}, {0x4, 0x9, {0x2, 0x5}}, {0x4, 0x1f, {0x1}}, {0x7, 0x9, {0x2, 0x9}}, {0xb1ed, 0x20, {0x1, 0x400}}, {0xffff, 0x9, {0x1, 0x9}}, {0x9, 0x3, {0x3, 0xfff}}, {0x5, 0x5, {0x0, 0x100}}, {0x0, 0x7, {0x2, 0x9}}, {0x0, 0x4, {0x2, 0x800}}, {0x8001, 0x2, {0x3, 0x9}}, {0x100, 0x0, {0x2, 0x98}}, {0x1, 0x400, {0x0, 0x1}}, {0x7f, 0x4, {0x3, 0x1}}, {0x0, 0xc6, {0x0, 0x5}}, {0xffaf, 0x7, {0x1, 0x8}}, {0x40, 0x10c, {0x0, 0x3f84000}}, {0x400, 0x8, {0x1, 0x1}}, {0xfff9, 0x0, {0x0, 0x2f}}]}}}, {{0x254, 0x1, {{}, 0x9, 0xff, 0x7, 0x4, 0x27, 'syz1\x00', "6f652af5ca83c4a489fd15096d2be6948b22fb34b52acbcbc5c7d3079e00f2dc", "41af91c6467b7b77bde762b08cdfec9744332eabd8f43ea90a63729c5ebbf522", [{0x9, 0x7}, {0x64d, 0x10, {0x2, 0x800}}, {0x100, 0xa0, {0x1, 0x200}}, {0x51d, 0xa3ad, {0x2, 0x10001}}, {0x3d85, 0x1, {0x1, 0x3}}, {0x1, 0x4, {0x2, 0x5}}, {0x5, 0x4, {0x3}}, {0x6, 0x7, {0x2, 0x40}}, {0x8be, 0x5, {0x1, 0x9}}, {0x0, 0x7, {0x1, 0x1}}, {0x6, 0x5, {0x0, 0x6}}, {0x1, 0xfff7, {0x2, 0x2}}, {0x7, 0x7, {0x1, 0x1fe}}, {0x1000, 0x6, {0x3, 0x80000000}}, {0x7, 0x9d4, {0x2, 0x4}}, {0x1, 0xff, {0x1, 0x7fffffff}}, {0x3, 0x80, {0x3, 0x10000}}, {0x4, 0x1d84, {0x3, 0x80000001}}, {0xfffa, 0x800, {0x3, 0x84}}, {0x5, 0x3f, {0x1, 0x40}}, {0x1386, 0x9, {0x3, 0xffaa}}, {0x90a, 0xd8, {0x1, 0x5}}, {0x6, 0xfff9, {0x3, 0x7}}, {0x6, 0x7ff, {0x1, 0x9a}}, {0x7f, 0xc1, {0x0, 0x7}}, {0x9, 0x800, {0x2, 0x1}}, {0x3, 0x81, {0x0, 0x7f}}, {0x400, 0x7f, {0x2, 0x1886}}, {0x40, 0x6, {0x2, 0x8}}, {0x1, 0x8000, {0x3, 0x9}}, {0x8, 0x101, {0x2, 0x1}}, {0x9, 0x1000, {0x3, 0x5}}, {0x1, 0x3f, {0x1, 0xb2}}, {0x866, 0x980, {0x2, 0x6}}, {0x51f, 0x40, {0x3, 0x2}}, {0x7, 0xc4b, {0x0, 0x10001}}, {0xff7f, 0x7f, {0x0, 0x200}}, {0x480, 0x7, {0x3, 0x1ff}}, {0x5, 0x94, {0x3}}, {0x80, 0x0, {0x2, 0xb42c}}]}}}, {{0x254, 0x1, {{0x1, 0x4}, 0x8a, 0x9, 0x0, 0x9, 0x17, 'syz1\x00', "ce75c6345456118f0a50231dff0f07720b863f08b8834268c242676abbb54136", "47f450b8c0faf17bda3b5d990a2188a8bab01c0abf8617be46e9b584aa6dad9a", [{0x9, 0x31e0, {0x2, 0x2}}, {0x5, 0x6}, {0xff, 0xfff, {0x2, 0x100}}, {0x3, 0x8, {0x3, 0x8}}, {0x3, 0x81, {0x2, 0x6}}, {0x7fff, 0xf594, {0x2, 0xc2f1}}, {0x1000, 0xfc00, {0x2, 0xa59b}}, {0x0, 0x3, {0x3}}, {0x2, 0x101, {0x0, 0x3}}, {0x4, 0xff, {0x3, 0x9}}, {0x31, 0x1}, {0x0, 0xfffd, {0x2}}, {0x2, 0x7, {0x3}}, {0x1000, 0x955, {0x3, 0x2000}}, {0x3, 0x1000, {0x2, 0xc9}}, {0x8001, 0x40, {0x2, 0x8cc4}}, {0x8, 0x0, {0x3, 0x9}}, {0x1, 0x7, {0x3, 0x4}}, {0x7, 0x4, {0x3, 0xfff00000}}, {0x7ff, 0x3f, {0x3, 0xff}}, {0x30, 0x7, {0x0, 0x8}}, {0x800, 0x81, {0x1, 0x1b}}, {0x8f9f, 0xffff, {0x3, 0x8}}, {0x8001, 0xffc0, {0x2, 0x8}}, {0x20, 0x1, {0x2, 0x74}}, {0x9, 0x6, {0x0, 0x2}}, {0x3, 0x4, {0x2}}, {0xa9, 0x3, {0x1, 0x6}}, {0x5, 0x8001, {0x3, 0x8}}, {0x9, 0x400, {0x2, 0x9}}, {0x1f, 0x5, {0x1, 0xff}}, {0x81, 0x0, {0xd012c9e717f4f232, 0x6}}, {0x20, 0x8, {0x2, 0x6}}, {0x8, 0x912b, {0x0, 0x9}}, {0x766b, 0x8d, {0x1, 0x7}}, {0x1, 0x0, {0x3, 0x41}}, {0x1000, 0x100, {0x3, 0x35f2d484}}, {0x5, 0x81, {0x0, 0x937}}, {0x4, 0xfffe, {0x0, 0x7}}, {0x1, 0x9, {0x1, 0x5}}]}}}, {{0x254, 0x1, {{0x2, 0xfffff45f}, 0x7, 0xa0, 0x4000, 0x40, 0x1f, 'syz1\x00', "ddc18466528aaf25b785062933b1138b726e3d14a91f204a2df483922ed6e9a4", "d6653799d8f8f934c48cc30788a3d81d7d5cd08622eeb4387c6812716de3d74c", [{0x0, 0x4, {0x3, 0x3}}, {0x8001, 0xfff, {0x0, 0x100}}, {0x140, 0xfffc, {0x0, 0x8}}, {0x9abe, 0x2, {0x0, 0x720116f3}}, {0x7, 0x3, {0x3, 0x7}}, {0x3, 0x1, {0x1, 0x6}}, {0x400, 0xfff, {0x2, 0xffffe924}}, {0xfffc, 0xfff7, {0x0, 0x7}}, {0x8000, 0x94e, {0x3, 0x80000001}}, {0x8, 0x81, {0x1, 0x8}}, {0x3ff, 0x400, {0x0, 0x9}}, {0x5, 0xfc00, {0x2, 0x42}}, {0x7774, 0x8, {0x1, 0x8000}}, {0x4, 0x40, {0x3, 0xfffffd29}}, {0xffff, 0xf000, {0x3, 0xfff}}, {0x0, 0x2, {0x0, 0x7}}, {0x101, 0x9, {0x3, 0x40}}, {0x1f, 0x1f, {0x2bfc816d9bcef068, 0x8}}, {0x6, 0x1, {0x1, 0x8}}, {0x9, 0x5, {0x3, 0x148}}, {0x9, 0x6, {0x1, 0xd5d1}}, {0x5, 0x5f, {0x1, 0x8}}, {0x800, 0x7fff, {0x3, 0x100}}, {0x8, 0x1, {0x1, 0x5}}, {0x8000, 0x6, {0x2, 0xfffffeff}}, {0x5, 0x8000, {0x0, 0x4}}, {0x600, 0x5, {0x3, 0xff}}, {0xff, 0x5, {0x3, 0x6}}, {0xad5, 0xce, {0x0, 0x1000}}, {0x1, 0x800, {0x2, 0x71}}, {0x3, 0x2, {0x3, 0xce18}}, {0xf001, 0x2, {0x1, 0x15}}, {0x1ff, 0xc85d, {0x3, 0x2}}, {0x5, 0xffff, {0x3, 0x3}}, {0x9, 0xfa, {0x0, 0x8}}, {0xc7, 0x80, {0x0, 0x2306}}, {0x0, 0x0, {0x0, 0x89}}, {0xfffe, 0x40, {0x2, 0x7fff}}, {0x9, 0x1, {0x1, 0x400}}, {0x7f, 0x5, {0x3, 0x8}}]}}}]}, 0x964}, 0x1, 0x0, 0x0, 0x24008841}, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="240100002a00798bc387004000000000000000df", @ANYRES32=r5], 0x2}}, 0x0) r7 = open(0x0, 0x0, 0x0) fchdir(r7) ioctl$KVM_XEN_HVM_CONFIG(r7, 0x4038ae7a, &(0x7f0000000040)={0x7, 0x0, &(0x7f00000002c0)="280db5caa9b297b2f82cb403c48eb330492968e873b78c9804acd223e52b85c64a199f8506e80181aa1bc0684f2534f2fad4a7d0cafdbe4fee9eea238dd7bc3e3451a306b654dabf32511a66a9b609e0", &(0x7f0000000340)="29a66ea48f332ca9be0bfa9a2cc12c50fe935fc2b09cc7e835bd2da77428aa87816b390f45ca86ea89bd6c8d8002220019cedec68b7bb37e78c62ba5f1d16f9b87c1ce975c7777efb1fb8591fa51a6c0b58ea43446bb4de28b", 0x50, 0x59}) splice(r2, 0x0, r3, 0x0, 0x100000000, 0x0) 11:16:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1) r2 = getpid() r3 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1}, 0x10, 0x800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000000c0)=0x8379) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}, @IFLA_NET_NS_PID={0x8, 0x13, r2}]}, 0x3c}}, 0x0) [ 136.404396] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 136.440891] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pig=7857 comm=syz-executor.4 11:16:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1) r2 = getpid() r3 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1}, 0x10, 0x800) ioctl$FIBMAP(r3, 0x1, &(0x7f00000000c0)=0x8379) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x4}}}, @IFLA_NET_NS_PID={0x8, 0x13, r2}]}, 0x3c}}, 0x0) [ 136.445148] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 136.495273] Unknown ioctl 1074283780 11:16:26 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x3b, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{0xa, 0x0, 0x0, @remote, 0x1}}}, 0x108) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, r0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0x10) r3 = open(0x0, 0x0, 0x0) fchdir(r3) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000001c0)={0x0, 0xcc, "90d3611c53568193583f61d3e9a8845c9478f105cd9a9d4aa39f73a10aec34f889ef73f90c63224f38df54f8dd4653e8d30b123e05bd8ed83e3986d3169a113d7e4b0aae9a57b106042d341c3f7f7cf7c41d395a921e21a59b4b79dc2993a4bb65fe37cf00b34e3762ee904d71a358f1317a9716bab81e3015c1adc3d63e4b4ee7863398166ac576ecc0fc34efbb8c2151fbc5e51464f1606a9008b7337d468d12513c2fb1562adfd55c7c4df139adf999670f9068cedfab9c94c23d1b41f1e896fce97282964b032118a8e7"}, &(0x7f00000002c0)=0xd4) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000300)={r4, @in={{0x2, 0x4e22, @broadcast}}}, 0x84) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r5, 0x0, 0xedc0) [ 136.629408] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pig=7857 comm=syz-executor.4 11:16:27 executing program 3: getpid() socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f0000000180), 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x7, 0x7, 0x2, 0x0, 0x0, 0xdf, 0x40200, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x0, @perf_config_ext={0x401, 0x2}, 0x12100, 0x5, 0x80000001, 0x7, 0x100000000, 0x9, 0x5}, r1, 0x6, 0xffffffffffffffff, 0x4f6529016cf513f0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, &(0x7f0000004080)) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) open(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00'}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 11:16:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r3 = socket(0x10, 0x803, 0x0) r4 = open(0x0, 0x0, 0x0) fchdir(r4) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f0000000000)={0x1, 0x18, [0x1, 0x4b, 0x7fffffff, 0x0, 0x1, 0xff]}) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x3e, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r2}]}}}]}, 0x38}}, 0x0) 11:16:27 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r4}, 0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r4, 0xaa7}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x228, 0x98, 0x98, 0x0, 0x0, 0x0, 0x190, 0x190, 0x190, 0x190, 0x190, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ip={@rand_addr, @remote, 0x0, 0x0, 'syzkaller1\x00', 'caif0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x288) [ 136.874538] syz-executor.1 (7875) used greatest stack depth: 23744 bytes left 11:16:27 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='@\x00']) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000002c0)) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 11:16:27 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00'}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000340)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'geneve0\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x34}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_MASTER={0x8, 0xa, r10}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7ff, 0x2}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0xc180) write$cgroup_int(r0, &(0x7f0000000040)=0x40000000000002, 0x12) 11:16:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "000074000000801000000000001a00"}) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x880) readv(r1, &(0x7f0000000600)=[{&(0x7f0000000280)=""/142, 0x27a}], 0x1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000000)=""/8) 11:16:27 executing program 1: r0 = socket(0x10, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @remote}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000080)=""/167, 0xa7}, {&(0x7f0000000e40)=""/159, 0x9f}, {&(0x7f0000000200)=""/207, 0xcf}, {&(0x7f00000004c0)=""/213, 0xd5}, {&(0x7f0000000300)=""/57, 0x39}, {&(0x7f0000000f00)=""/185, 0xb9}, {&(0x7f0000000680)=""/84, 0x54}, {&(0x7f0000000700)=""/80, 0x50}], 0x8, &(0x7f0000000800)=""/193, 0xc1}, 0x0) write(r0, &(0x7f00000003c0)="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", 0xfc) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000340)={'team0\x00'}) sendmsg$IPSET_CMD_GET_BYINDEX(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0xf, 0x6, 0x0, 0x0, 0x0, {0xc, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x20004085) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f0000000ac0)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000c40)=[{&(0x7f0000000b00)="835bf2be174d7649949241a98aa12fafbde0896dc4268701fcd1cb8af9b0643d27bf4c8e46df66ab64e38972c0b75b93d3deb21ef6ad320cedf91a1c5210f9b32f7d6f623e622583f6608064a372476126fbb611c9c74c04d659e5cd8df1518743300160872313cbb8c9547f18f7226bbbd45989c3e209dbbe70fea7ac9c6d4baca361a263d89c24c6ae2064d6", 0x8d}, {&(0x7f0000000bc0)="d7625a3d75e7385d73b1912b03c51cefea20f05683a75a266eb6dd7bad3d389737e26b3c12fd4840df40647fcf77408ae34d70fe7239886c8db8287dd792bf479d323d6a688ab587d286f5afe8953ab078e5093c3e0dff", 0x57}], 0x2}}], 0x1, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="35281540e65fa19937f209d1bf3e9be2f261268d363d0000000000000000148a40dd67553ed12fc24c33588ffa2bb5fe69aaa919bc31a5641e1285c5b600278b100b8a0bf59881d2a835ebb5ff25d7848983ebe540a6718a75f82ceabcc2f42071e922381e1c69f8ba224c962b857bdde157235fa31cf0dd", @ANYRES16=r3, @ANYBLOB="0101000000000000000001000000440001000c00070000000000000000000c0006006c626c637200000008000b0073e9700008000800000000000800090000000000080001000a0000000800050002000000"], 0x58}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000a80)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x808008}, 0xc, &(0x7f0000000a40)={&(0x7f0000000940)=ANY=[@ANYBLOB="dc21ff00", @ANYRES16=r3, @ANYBLOB="10002bbd7000fbdbdf25020000001400038006000400e0ff0000060007004e22000024000280080003000200000006000e004e22000008000900a3000000080007000600000008000400030000006000038008000100010000000600040009000000080005007f000001060007004e210000060007004e20000006000400000000000500080004000000060007004e2000001400060000000000000000000000000000000000080005000000000008000400010100002000038014000600a0bf29ad29fd17eb87b3af770b3d1a20060004003ad10000"], 0xdc}, 0x1, 0x0, 0x0, 0x4000804}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="a7800000000000000000010000000000000000000000000000001090bac4a2429288a649c72acbdfee185f416d68c52a8d0c2d05183d9aab2d3dfe3afb09ef01839fd2eba9da1e7fcad335e86543f4d793c6dc5dc5bd5868ae2d836980"], 0x3}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x1c, r5, 0x8, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000405) [ 137.304271] device geneve0 left promiscuous mode [ 137.317361] bridge4: port 1(geneve0) entered disabled state 11:16:27 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) r0 = getpid() eventfd(0xe95) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5, 0x40000}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect(r2, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x4, 0x0, 0x4, {0xa, 0x4e20, 0x40, @loopback, 0x7}}}, 0x80) r3 = syz_open_procfs(r1, &(0x7f0000000080)='coredump_filter\x00') setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r3, 0x28, 0x6, &(0x7f0000000140)={0x77359400}, 0x10) r4 = open(&(0x7f0000002000)='./bus\x00', 0x1518c2, 0x0) sendfile(r4, r3, 0x0, 0x209) 11:16:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) lsetxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa84c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe(0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x5, 0x3, 0x0, 0x3]}) write(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, 0x0) getresgid(&(0x7f0000000240), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f0000000340)={@any, 0x48000, 0x200, 0x40, 0x0, 0x1, "2ba23b6b3600a2af0c2e26a7ca3b534b30973f30ef6ae2eae7dfd5638df3419dc177f6d5b2543b22419e8983dc4979e8ce9dd8f53859fc95e2d24ca80d02ca0191b2a5b92cd4aa1c3f4bb3c7725d43fa5ee579a4dfe167c85736a002ce9c19d85f33435210a0171bc8744889e3d298cdc695552e1d8275cafbd2cba55419cb78"}) setresgid(0x0, 0xee01, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) fchown(0xffffffffffffffff, 0x0, r3) 11:16:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) r4 = openat$cgroup_ro(r3, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f0000000140)=""/143) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = open(0x0, 0x2e040, 0x180) fchdir(r6) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={{0x14}, [@NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x48}, 0x1, 0x0, 0x0, 0x7c125c506951de27}, 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r7, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r7, r7, &(0x7f0000000240), 0x7fff) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r7, 0x84, 0xc, &(0x7f0000000200)=0x2, 0x4) 11:16:28 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) r2 = open(0x0, 0x0, 0x0) fchdir(r2) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000080)={{{@in=@initdev, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x15}) 11:16:28 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r0) 11:16:28 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00'}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000340)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000300)={'geneve0\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x34}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_MASTER={0x8, 0xa, r10}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x3}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7ff, 0x2}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0xc180) write$cgroup_int(r0, &(0x7f0000000040)=0x40000000000002, 0x12) 11:16:28 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='mpol=interleave=r\nnE]Helative,mpol=default=relativ']) 11:16:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x100}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) inotify_add_watch(0xffffffffffffffff, 0x0, 0x30000010) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) fcntl$setstatus(r4, 0x4, 0x44000) write$ppp(0xffffffffffffffff, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) getpid() r5 = getpgid(0xffffffffffffffff) sched_setattr(r5, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x80000001, 0x3}, 0x0) r6 = open(0x0, 0x0, 0x0) fchdir(r6) ioctl$KVM_SET_VAPIC_ADDR(r6, 0x4008ae93, &(0x7f0000000100)=0xf001) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0xa8802, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, r8}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 11:16:28 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x8000000200109041, 0x4000000800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x131100, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f0000000080)=""/16, 0x10}, &(0x7f0000000100)}, 0x20) 11:16:28 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in={{0x2, 0x4e23, @loopback}}, 0x0, 0x0, 0x22, 0x0, "b1f3df090d70272dfe335dd4f6f32460d6c41d67633f82ca637e71d2434f3bff243bafe63f41c8658b356507e671251146c86454c7d8934a277b3826688960f2a9d425d7a26c486c889280b7dcb136a8"}, 0xd8) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x18401, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r4, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r5, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="28d32cfed0e5189ca8648dd54a74008000", @ANYRES16=r3, @ANYPTR64=&(0x7f0000000800)=ANY=[@ANYRESOCT=0x0, @ANYBLOB="79f7081ddc3c1bb0f5695605c5d5a87efa4ba7", @ANYRES64=r4, @ANYRES16, @ANYRESDEC=r5, @ANYBLOB="7d7e8af66eef37f769f93ead6d7fad328ae4d05ec88ff4265eb3d8ef176a5078ed2807eefcfa94ffe04c11cc", @ANYRES32, @ANYPTR64, @ANYRESHEX]], 0x3}}, 0x40084) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r3, 0x410, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf87}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4010}, 0x8084) r6 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r7 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000540)="d85ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a05000000000000000000000010008107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637a51d482394f2181e31ff307a2ace003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d3", 0xc0, r6) r8 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000)="03", 0x1, 0xfffffffffffffffd) r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r9, 0x8905, &(0x7f00000001c0)) r10 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd", 0x39, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r8, r7, r10}, &(0x7f0000000440)=""/243, 0x23d, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) write$P9_RLOPEN(r1, &(0x7f0000000680)={0x18, 0xd, 0x2, {{0x1, 0x4, 0x6}, 0x2}}, 0x18) [ 138.209086] tmpfs: Bad value 'interleave=r [ 138.209086] nE]Helative' for mount option 'mpol' [ 138.278306] tmpfs: Bad value 'interleave=r [ 138.278306] nE]Helative' for mount option 'mpol' 11:16:28 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) r1 = fanotify_init(0x0, 0x40000) dup2(r0, r1) 11:16:28 executing program 2: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@getroute={0x14, 0x1a, 0xea44699f87bd1fa5, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1f9502d02e1cfdfa}, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x450000, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000240)=0x4201) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f00000002c0)=@usbdevfs_driver={0x81, 0x40, &(0x7f0000000280)="05e4dc761558b5d25f5370d1939b1ca6df586f715a626ecff4523da6b109232e3294af3b368630cac3779d2eca91fc6cdd6d34"}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r3, 0x1, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0x17, 0x0, @udp='udp:syz2\x00'}}}, ["", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x884}, 0x4810) 11:16:28 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x8000000200109041, 0x4000000800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x131100, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f0000000080)=""/16, 0x10}, &(0x7f0000000100)}, 0x20) [ 138.560597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=7990 comm=syz-executor.2 11:16:29 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c000000010a00000000000000000000000000000c00044040000000000000000900010073797a31000000004e4056731761ab1040a383047e8047f843db63a89228fe3ef9a5ed96c978d1f5d09196791ceb6fdf"], 0x1}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 11:16:29 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1d2d) openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = getegid() syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f00000000c0)='./bus/file0\x00', 0x7, 0x3, &(0x7f0000000380)=[{&(0x7f00000006c0)="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", 0x1000, 0xe9e}, {&(0x7f0000000100)="d85204c7ebe3e0ed82456fd2fcb205f148ea6a6787673ca6634a2c0179d0f6d03663faea2815ab9f2bce4f815edcccbe3dc75d27a6c875", 0x37, 0x800}, {&(0x7f0000000140)="708e3dbacbaab86124af5a6c97b3dc456cbee028", 0x14, 0x1}], 0x10800, &(0x7f00000016c0)=ANY=[@ANYRES64=r1, @ANYRESHEX=r1, @ANYBLOB="2c687567653d6e657665723d657468307d252c687567653d616c776179733d657468307d252c687567653d616c776179733d736563757269747965746831776c616e302c687567653d616c776179733df82c6e725f696e6f6465733d302c687567653d77697468696e5f73697a653d706f7369785f61636c5f6163636573732c7063723d30303030303030303030303030303030303032372c66736e616d653d6b657972696e676e6f6465762b2573656375726974792b7573657273656375726974797b2c6673636f6e746578743d756e636f6e66696e65645f752c6d6561737572652c00"]) r2 = accept4(r0, &(0x7f0000000400)=@nl=@unspec, &(0x7f0000000480)=0x80, 0x80000) getsockname$tipc(r2, &(0x7f00000004c0), &(0x7f0000000580)=0x10) syz_emit_ethernet(0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffff00fffff674047367a686dd60a4f008003f3a000600000000000d000000000000000001ff0200000400000000000000000000010200907800000000600004e600000000fe8000000000000000000000000000bb65769ce88b754f678efb226d1b1cfec13afa53ceebf475acea968bed8cd721b396fc540c9a7a33c2e482d7dd41176dccb56cecfb32603bc07ad0d1535b016f61021e992f3451e13949965172aa3b7504cda8c847ea369cc9367f23c6a4dbb977e3a5074d8b72b29e61d870d2eefb3b8b9b5e670aadf9b5"], 0x0) r3 = open(&(0x7f0000000180)='./file1\x00', 0x1730c2, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0xc000, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r4, 0x500e, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000500), &(0x7f0000000540)=0x4) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 138.731895] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 138.774990] EXT4-fs (loop0): filesystem too large to mount safely on this system 11:16:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbbffffffff, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) r0 = memfd_create(&(0x7f0000000500)='/dev\x8aT\xc0_\xb7#\x10\x160xffffffffffffffff, 0x0, &(0x7f0000000100)={0x9e0901, 0x3, [], @p_u16=&(0x7f0000000000)=0x90d}}) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e22, 0x7ff, @local, 0x7ff}, 0x1c) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r1, 0x0, r2, 0x0, 0x100000002, 0x0) 11:16:29 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x48400, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) statfs(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)=""/1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKRRPART(r0, 0x125f, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r6}, 0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000003c0)={r6, @in6={{0xa, 0x4e22, 0x725c, @rand_addr="0b370bef3e34e5a311b40a69289925d5", 0x11}}, 0x20, 0x5}, 0x90) chdir(&(0x7f00000002c0)='./bus\x00') open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f9965762f6e62643000"], &(0x7f0000000200)='./file1\x00', &(0x7f0000000280)='selinuxfs\x00', 0x1950e0, 0x0) [ 139.290185] audit: type=1804 audit(1580382989.648:53): pid=8020 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir372026989/syzkaller.lIuIsy/13/bus/file0" dev="sda1" ino=16598 res=1 11:16:29 executing program 0: setgroups(0xc64408e, 0xffffffffffffffff) 11:16:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "2014d32961cac078ed2102564064f3ba3155a9a6"}, 0x15, 0x1) sendmsg$sock(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000780)="1f11c391ebb0498200c347e9bd47244fd3a5c023544bcb8aa2529d374448452e2f7b27efda85e330dc9220b9081ef4e1f31c0e632cad4fc988caf71b479bc6c8e1c31a471c76fcd44961d295561c906c7f45fb3d2197e86aa42fa237e4880e1c43f22ef649b1e31f8eac87aef5fd0dc37827e4d4c83a4b80dcc5b6d97b441cbfc8", 0x81}, {&(0x7f0000000840)="f46cbd20fd4b1cbce1a13485b90f59ea6f6ff7d1d49d49638713fdb1f9948a1c0b6f3fe3d61a2acf22d1366859278aeff3d7877b013f83663b0b10f2a41ede88514b50e870f171bf281675932c38887237a754b1bd142f633071c6621340274ad26fec3bca58a92c7a867327e91084834ea6e49a916be86a997789b25ceec3a9ff834cf36c1ffc120777c2f6d1216b5b23985b4d7df305bf6cdf43cc3b319f76429b45aa7ce56ebeb46a5d2968b8abe4ec5436fdd6b685ce3c63ca248d995177ac0d4bdc074e70f32c4e750b11fb6a240e770da692e8015ee679bc9a3bf1a852b280f5f673ac8f9fe986ee48fb7aeb7062de7224aad9966d454cc69a96", 0xfd}, {&(0x7f0000000940)="c97bead89525da49a6e9e27830e41ac4aa53b96bf12be3495b331e23ee0c4747d34977d8bf41ab9f082d981f820fa784fd2274ad3944d71110286a211b65db461de7cd29323b", 0x46}, {&(0x7f00000009c0)="9a97b4714716eac6000e39ae06bb1893e3abdb1c3bc5439ded8ec8258984d920fd5c16aa0e08751b24f01dfbe9739d021138fe06f497c78c21c8c2aeb603c16ad31d42ed3f239652eced63555f131fba39d3cb2bac97a366e5b3aacf5705ae4ae9bfece85d6c15f38cf83738cbd3d0648ceb04dceb7d968e12f6be4a7cf42dcaf8fc9ec5a4c44ce73338ead1d78e9054becf951dd58c56d458f90d69dad1bea60ac98f3ffc14fd9d7d0b984911e3d4e82eb41ec3236ac6f6460e4fb7", 0xfffffdd9}, {&(0x7f0000000a80)="8b392db9b7a4ffb8f4184472a38d4021e56db1c33c4b2b363aa62702ccc4c13a65eca09d69ea4a69debbb41b0862798f28174adb11b105f136e0410359c1f3cc0e1eebe2490039a3806968aaefe814e21ed9596058b3450a5784210b84cbc39cbac76865ea762634b394bf62656fed0bed1daf55aa352b13e45b08c63726b9956e3879922591e38b9f149cca01321d3ecc7bc5c261cbc774e2a2d45e54c61f", 0x9f}, {&(0x7f0000000b40)="cc0004b41ece4bba9770befebb3520104bd32c10a73f84e0c8c28fe2f74d57d8b3d514616ecb3d72ad882932e78da5", 0x2f}], 0x7}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 11:16:29 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3b, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffeb2, 0x0, 0x0, 0x3, 0xfe, 0x0, 0x140c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = getpid() tkill(r2, 0xd) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r3, 0x0, 0xedc0) 11:16:29 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0xca0cd5dc84907da9, 0x0) read$FUSE(r0, &(0x7f0000000380), 0x313) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x82100, 0x0) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x8010500d, &(0x7f0000000040)) 11:16:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000040)=""/255) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/41, 0x29}], 0x1}, 0x0) [ 139.496946] audit: type=1804 audit(1580382989.668:54): pid=8020 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir372026989/syzkaller.lIuIsy/13/bus/bus/file0" dev="sda1" ino=16607 res=1 11:16:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f00000000c0)={0x73}) r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) syz_read_part_table(0xe4ffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000040)="02006800000ffffffff60005000000e08128b14700000000d59863d20000000002000f2020cc00000000ff0700690000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 11:16:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x6c}}, 0x0) 11:16:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000040)=""/255) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/41, 0x29}], 0x1}, 0x0) 11:16:30 executing program 2: perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) pipe(0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x10003) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 139.719126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=61928 sclass=netlink_route_socket pig=8062 comm=syz-executor.3 [ 139.751367] loop4: p1 < > p4 [ 139.761129] loop4: p4 start 1854537728 is beyond EOD, truncated [ 140.040997] loop4: p1 < > p4 [ 140.050787] loop4: p4 start 1854537728 is beyond EOD, truncated [ 140.142569] audit: type=1400 audit(1580382990.508:55): avc: denied { map } for pid=8013 comm="syz-executor.1" path=2F6D656D66643A2F6465768A54C05FB72310163C4BDF85A02046660D44E65435EC78CC9E27147CB2D6332371722098EEE6D303DFEE523C78386F20063670D7B6BE9F6D167771D1EC5D98A0B17B4EA2048A9580565E71E1BCAB4BB25D3B7A3A3526B0EFF6941C4B621B266B48FDD6799168A435DF6F13D74D272D0604359EB5DD559EA16402506ED942B0E4039B6D4001D19F808475998759A61275BAFD6D4463DF0C3D2CC7EDD0756B79BEA0C3540A23BFABDEF9C016DC56D8114EC720484D3235B32377984BF47C98D42769F42D5651227E1DD1F53C8CA40531D9180992E12D8C275CDEC8F2202864656C6574656429 dev="tmpfs" ino=31050 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 11:16:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbbffffffff, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) r0 = memfd_create(&(0x7f0000000500)='/dev\x8aT\xc0_\xb7#\x10\x160x0}) ioprio_set$uid(0x3, r4, 0x9) finit_module(0xffffffffffffffff, 0x0, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000180)) getcwd(&(0x7f0000000440)=""/158, 0x9e) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 11:16:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x70) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3800000010000507000000000000000000ff0000", @ANYRES32=r1, @ANYBLOB="00000000000000001800128008000100736974000c00028008000300", @ANYRES32=r2, @ANYBLOB], 0x5}}, 0x0) 11:16:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000040)=""/255) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000180)=""/41, 0x29}], 0x1}, 0x0) 11:16:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x148, 0x0, @perf_config_ext={0x0, 0x394}, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000180)=ANY=[]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x22400, 0x0) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000480)={0xa, 0x0, [{0x80000019, 0x9, 0x2, 0xf44, 0x2, 0x421, 0x3}, {0x80000019, 0x10000, 0x0, 0x3, 0x4080000, 0x9, 0x80000000}, {0xd, 0x2, 0x2, 0x80000000, 0x1f, 0x7, 0x6}, {0x40000000, 0x5, 0x1, 0x1, 0x20, 0x5, 0x1f}, {0x7, 0x139, 0x2, 0xe, 0x5, 0xfffffffc, 0xf021}, {0x40000000, 0xfffffff9, 0x0, 0x10000, 0x6, 0xff, 0x3}, {0x80000019, 0x5, 0x6, 0x1, 0xb8, 0x3, 0x80}, {0xc0000000, 0x6, 0x0, 0x0, 0x6, 0x6, 0x800}, {0x80000001, 0x81, 0x2, 0xd65, 0x1ff, 0x2158, 0x6}, {0x80000019, 0x1, 0x6, 0x9a, 0x1, 0x0, 0x4}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x20400, 0x0) getsockname$l2tp6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000300)=0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SYNC(r5, 0x5001, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000180)=[{}], 0x0, [{}]}, 0x88) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fdc000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000000)="460f01ca430f01c3f2420f015d00470f07c44379169806000000b5c4014566b6709f000067460f7082090000008b420f01306536360fc72d08aeca6066f36f", 0x3f}], 0x1, 0x1, &(0x7f0000000080)=[@vmwrite={0x8, 0x0, 0x10, 0x0, 0x3, 0x0, 0x2, 0x0, 0x348f}, @efer={0x2, 0x9001}], 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:16:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x100000001) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) dup3(r3, r0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="520d07e91b602d788418e4bad9b1298430b9c633f42a04bc19e5c75f141e596aa7b79be3f12784b9a5f9f71aa8660e1007685ba51d6fa026b482ca70025ca40ffc7059bc1499fe7dde48598a6ae74c61b211c209ab3cee2cec28a1bc107dbe93bb04e26c977fa96041821dd799ba9408fcb62966f6d8734ef4f7d0b96bc51a5288957a86b25a6bfbfa4baade5157f8a181ff3fbfb406a5998809a2403ca0c54219a71b2f6a0d721c227e32a4e4119258f547ffba3129c594460e17", 0xbb) 11:16:30 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) vmsplice(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xc6, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000000c0)=""/27, &(0x7f00000001c0)=0x1b) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}, 0x0, 0x0, 0x0, 0x9, 0x400}, 0x0, 0x7, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="6b8416178e5239b1f2eba89ec1f669b3144cc88b27a29290149f581d11bb0700b6b312fbb1eb6930e5e778b52cc18ecf5ae97ce83b5ec8a6470a11f0bb99e6a047cb5c747f0476035bcc6d05d8335439cc6af5f9d4f060ddf544ffc73a471481048ea89e4f9f8c8a9819f52a1d1e0c0f9cfe467cffb3e6983c219f46e79dca89de0297dc0bfb0000d7b6827d00009edc551727e03f396b2d14a40b4275ac886e7e289c6aff649cc766c8a787df911d2f18a34f3c30fb1936d10225ae139a64383860342b1d005df739f55d68b9870697c28b6747093dfaa083b53a19b73501af930db94aea37c64302a3c38846444944fe21"], 0xf2) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x8020003) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) 11:16:30 executing program 5: add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = open(0x0, 0x0, 0x0) fchdir(r0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x4000, 0xc0) [ 140.515960] *** Guest State *** [ 140.522491] CR0: actual=0x0000000000000031, shadow=0x0000000060000011, gh_mask=fffffffffffffff7 [ 140.619929] CR4: actual=0x0000000000002050, shadow=0x0000000000000020, gh_mask=ffffffffffffe871 11:16:31 executing program 5: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x1132}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket(0x11, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200), 0xc, 0x0}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text16={0x10, &(0x7f00000003c0)="66b94303000066b8b888000066ba000000000f30360f7828670fc71cc0b834018ee066b9660200000f3265a5f30f0966b9800000c00f326635000400000f306467f01820660f3881a493b9", 0x4b}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4ca]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000440)={0xfff, 0x5, 0x2e, 0x20000, 0x1, {r5, r6/1000+30000}, {0x3, 0x8, 0x9, 0x70, 0x1, 0x39, "02cb823b"}, 0x395a, 0x1, @planes=&(0x7f00000000c0)={0x24ec, 0x7f, @fd=r4, 0xffff}, 0x0, 0x0, r4}) ioctl$DRM_IOCTL_GET_STATS(r7, 0x80f86406, &(0x7f00000004c0)=""/114) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, 0x0}, 0x4) socket$nl_route(0x10, 0x3, 0x0) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) [ 140.717979] CR3 = 0x00000000fffbc000 [ 140.745583] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 140.791132] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 140.844924] Sysenter RSP=0000000000000f80 CS:RIP=0050:0000000000002810 [ 140.906051] CS: sel=0x0030, attr=0x0409b, limit=0x000fffff, base=0x0000000000000000 11:16:31 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000100)='big_key\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="ffd9534b6bf1831c1969030000005b7213f6012f663000000000e0529ce3a936850000392681fb6f93d52cf57a8ac75f3e9ca77b4db77b74412c6536abf8f147905f2e34287ef98c1fd8c759aed07db94922e29ac209f7e6fd2eebf0865e0ceb75770b9e5d37ff209aaa8938c82e134d745bb5debaf2c2e5fed8f792279e1908659edf772f27c1c6a94ee8a0d6ade7c2313746fa83eeb45333ac035e5e021deae55eeb9e6dfd2d5acd3f7385aaf1f0d8d4e03483448f0cefbffe990331932b27e8a404b219d816fe34e2c820b354b050bbc74e36afeac1e8ffa887ec7da9c8fd04a64b3e05d0d104e6651f2c097dc6d7bf20403f938f04d2134899b53dbbbf00"/277], 0x59) r3 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0xfffffffffffffffb, 0x0, 0x2, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000140)=0x1) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x30000400}, 0xc, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x4048000}, 0x0) lstat(&(0x7f0000000280)='./bus/../file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r4, 0x9) finit_module(0xffffffffffffffff, 0x0, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000180)) getcwd(&(0x7f0000000440)=""/158, 0x9e) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 140.967188] DS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 141.045881] SS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 141.142755] ES: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 141.185251] *** Guest State *** [ 141.204841] CR0: actual=0x0000000000000031, shadow=0x0000000060000011, gh_mask=fffffffffffffff7 [ 141.226021] FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 141.252464] CR4: actual=0x0000000000002050, shadow=0x0000000000000020, gh_mask=ffffffffffffe871 11:16:31 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000100)='big_key\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/277], 0x59) r3 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000380)={0x0, 0xfffffffffffffffb, 0x0, 0x2, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000140)=0x1) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x30000400}, 0xc, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x4048000}, 0x0) lstat(&(0x7f0000000280)='./bus/../file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r4, 0x9) finit_module(0xffffffffffffffff, 0x0, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, &(0x7f0000000180)) getcwd(&(0x7f0000000440)=""/158, 0x9e) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) [ 141.301394] GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 141.329925] CR3 = 0x00000000fffbc000 [ 141.352659] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 141.355078] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 141.403756] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 141.416063] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 141.437595] Sysenter RSP=0000000000000f80 CS:RIP=0050:0000000000002810 [ 141.482586] CS: sel=0x0030, attr=0x0409b, limit=0x000fffff, base=0x0000000000000000 [ 141.489851] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 141.540635] DS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 141.554401] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 141.603455] SS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 141.607873] EFER = 0x0000000000009000 PAT = 0x0007040600070406 [ 141.669819] ES: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 141.706003] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 141.717619] FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 141.772690] Interruptibility = 00000000 ActivityState = 00000000 [ 141.802610] GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 141.832455] *** Host State *** 11:16:32 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="00000000862d3f59e4081888c15009", @ANYRES16=r2, @ANYBLOB="080025bd7000fcdbdf250800000008000700ffffffff14000500fe80000000000000000000000000000d08000700ac1e010114000600fe80000000000000000000000000000f1f00010063707573657426405d73656c696e757873656375726974797d24000008000800ffffffff08000c000300000008000c0001000000"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000280)='illinois\x00', 0x9) membarrier(0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffe) [ 141.857012] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 141.868345] RIP = 0xffffffff8117a4e0 RSP = 0xffff888060cf7998 [ 141.889839] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 11:16:32 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@l2tp={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x1, 0x366, 0x7, 0x2, 0x4}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000200)={r1, 0x3}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000280)={r1, 0x4}, 0x8) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0x5) [ 141.920282] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 141.926809] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 141.953431] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 11:16:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x1, 0x7, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000100)=0x4, 0x4) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r5, 0x4018620d, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = socket(0x2b, 0x6, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00$\x00'/20, @ANYRES32=0x0, @ANYBLOB="97f3f9556cf2fc6dd0afc267c68635d40c5e8e75ccf79c2f9d345344dc7ce48e802413d6da6217715d7e9abef7b7a11a6ce730bbe826016c2ebb0241144b8fe2545fab7c1bcbc202978565e54f147eefe82f699141c812a2f8734d07bc8bfd4efef3730800bacbf311e3a625a6bb3046126067ab103175f77a34f39d7abf58eaf21ce312ec4d812c1a49fc58a3f1f7914ad5591585424bda0a29d9ce14ae39b2c50a1565a7b4833ae8ab639880bf3509e18e9084066f2240f5b34fff8ee4984f4cbd870df254e2fea2d3b8208a"]}}, 0x0) [ 141.993771] FSBase=00007f29a596f700 GSBase=ffff8880aec00000 TRBase=fffffe0000003000 [ 142.028356] EFER = 0x0000000000009000 PAT = 0x0007040600070406 [ 142.030783] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 11:16:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xa0419, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x285) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) r1 = open(0x0, 0x0, 0x0) fchdir(r1) sendto$inet(r1, &(0x7f0000001400)="feb90b53599a39ef0d3efcc1b9a058473dd7f2007ff201831c981ed22842c928f34d5dd50a6083bfe363", 0x2a, 0x4000000, &(0x7f0000001a00)={0x2, 0x4e23, @loopback}, 0x10) sendmmsg(r0, &(0x7f0000001900)=[{{&(0x7f0000000040)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x1}}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000140)="abc2d5ac954c178e0eb30dc536001833865792a1c81345499bc97e051e89ab11a2c1077f898ca6e63506bfce68193a78909c7ddcd65aaa380f12c5db3e377bc1d26ba9d41db3b7827a25108f2a21240fe97a5020f3c70dc2f6f136e324b8048c8bc2bff149496009b133a2e5ce03cfd040a7ce2494096cb65f13e9ea6d9afdd40d7a64fa5809ae190c1a1ba63b13ab177f3e384cedf61bfb901748adc7a30236ce023a01a3c30196ed3ba675c276919523a42a6cfa91ea47ee5fce8b1b513d200bc115195f1ff1385664199f6f6ad69bb5dc8da65144ebf0f540beab39", 0xdd}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="623481829081930110a8b5b5a092d2a9a3d20e7d4d81493e92cf84d31236dff7258d73a7b52eb5dfe9b8e5c79a380c6bebe916a8dd43ac8b2db27507b3379ca63ee58ddb20d1cee14d2ea1558503294b38bcf7cf46a00da8358604baee1f70dce39a061de06bb06c3fdd05d0becb478cc49f4fa4fbf2269a8fba2b1d0c5a88745df04511ac4d7b1f373036b3ffea2377a71ae24ee10fbfa4806e1dc841252ac6000fee00e7a508f2aa7978890150533f4cfe13bef2c80969e4a49e4f1a804a3fc6237da3fb41e70eab1e93798a45e0db5a48df420f4e346d04deebb2", 0xdc}], 0x3}}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001380)="6c3aace86a05af1a15d8a2e971f91e9c366a845effa2491c19ce49e8c045d5585923254d35d337ce97216fbc9c7820f4e8c684a3ca7a6c33b5bee2f52eb2400221a9ba825bc4ca8a41fcd361551a570f83caf23653f6d82aeb661d", 0x5b}], 0x1, &(0x7f0000001440)=[{0x88, 0x101, 0x20, "9c7321d55cea68705618658cd634f3144dbb81545a65773f4a34c261a89a805698fc3fcf16d2e9d2ddc8eb1dc0ef200e4a2c34d6e102dbc5e62429eaa5336ef89ff33e0702a5a8909cef2179b1ba0e3354f6e5fc5aab63f6ddbea011abe6170eef1f6bd84ea3975a497ff47ba742301e8fadcbd1d1f9b718"}, {0x110, 0x10c, 0x8, "3b264bd189ff9625932263f2fca833373a2fa0c6261ed09ad80b8e52cd265a572bc05c5b536f70ee0a93c9bde191726a7227b3c0fdb1a88540039da1d029f2aa61f74503f9adac8b44bb09fb9a6249662abbff725853a245ea33517586be5a1904deb1b58feb5f9b4942cafccc54432379d55656de7ae90357280e428bd486e6f75e5462d7b3f88889c691e67cacb7369022cc42be871788bdb2a403888a581bb6171eed8adf1f727151dc60ade6a59546322395ddc67a5f7e3d4f1a073f125d9f2fa2f42af1040385f4271566d4367fcb0305df6b84020ab6bfd2807801fb661b716a2176f4a93e1225623974e2a6c9c9d67c6fc49052c66e"}], 0x198}}, {{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001600)="39159714f0a4edfa4414f984627f6ade7dbf3b363ad170a49f183d9cdb7cfdf98777862db48419e7da03bcaf2ca1e8a7a596f164d9fe4eb058fdb5b15d376cd65245cc7093020c00ddf345e18853e52528246508a16f345994f54a6b2311720432d824d99ba8c2d701458d7d6e8e540742d94ab40a0eb211acd11d7a9893edc400bff1f64a3fa5fe8dced29542f749b77c15aa9e5684816d7be44e901c277980198bab79dcc6887a4edbb38aceeeeea71a73bb9a2c5abb1c31ce4b32ae3a268319b71b8e0dfe4d1c92c40a13830e1b8dcddef389086b693c38c6e79cc196bc", 0xdf}], 0x1, &(0x7f0000001740)=[{0xb8, 0x104, 0x101, "874b279af2536cfc3bdbcd68fccb96a76c819a08d1d92217552d42e8e7960c607c50d51f11f2c0549bcbb8e525a56a798e59fee89789d9d12bba249393e5df0b9b8ca6524958276b9c917d8311138478e23d2032c0a549de4a9d5d7a184aad524c09c64c53227c7d887b79f338fc0a40a6de604f703692a00559edb7583d67cb44aa3f6278ea00ba795cb00cd3df4a94e9ab338335a507797fa11b409adb5b2906"}, {0x78, 0x10f, 0xdaf0, "6be9f319735aad9804310cb237ed492a7e70dfaad48b1ed13069cd64822c29108d4907abf825702918ba5766739847ff027d49fcef0d726d87e85174bbd24c9e589402852b335661bb64f2c5ff58cd186e4ef2fe568bddd85fdfc61f7d9ad7074cf9a2023fb8"}, {0x88, 0x10f, 0x8, "7c4d02c7cc2b66b6e891b4ab8037019d4c72d9f005c1061cb1589e51ac0d3b0c3fb00d2501ee76f55dd33670e366145ee00701a818bc6ace1b14dba4a3e64a87671fac06f7ae2f6ada31100b42cc6a93a832851e5d6143c76a77cc8f73779a7c741f239d9c85ab070344a4722b5434ba65c4cb21c6902d6e"}], 0x1b8}}], 0x3, 0x0) socket$caif_stream(0x25, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000001a40)=0x0) ptrace$pokeuser(0x6, r2, 0xfffffffffffffffe, 0x5) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) [ 142.081466] CR0=0000000080050033 CR3=0000000060a33000 CR4=00000000001426f0 [ 142.101970] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 142.121578] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff868018e0 11:16:32 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) vmsplice(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xc6, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000000c0)=""/27, &(0x7f00000001c0)=0x1b) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}, 0x0, 0x0, 0x0, 0x9, 0x400}, 0x0, 0x7, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="6b8416178e5239b1f2eba89ec1f669b3144cc88b27a29290149f581d11bb0700b6b312fbb1eb6930e5e778b52cc18ecf5ae97ce83b5ec8a6470a11f0bb99e6a047cb5c747f0476035bcc6d05d8335439cc6af5f9d4f060ddf544ffc73a471481048ea89e4f9f8c8a9819f52a1d1e0c0f9cfe467cffb3e6983c219f46e79dca89de0297dc0bfb0000d7b6827d00009edc551727e03f396b2d14a40b4275ac886e7e289c6aff649cc766c8a787df911d2f18a34f3c30fb1936d10225ae139a64383860342b1d005df739f55d68b9870697c28b6747093dfaa083b53a19b73501af930db94aea37c64302a3c38846444944fe21"], 0xf2) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x8020003) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) [ 142.160727] audit: type=1804 audit(1580382992.538:56): pid=8164 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir687532776/syzkaller.eABzyA/17/bus" dev="sda1" ino=16602 res=1 [ 142.165589] Interruptibility = 00000000 ActivityState = 00000000 [ 142.193951] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 142.217925] *** Control State *** [ 142.226539] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000ea [ 142.253988] EntryControls=0000d1ff ExitControls=002fefff [ 142.271245] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 142.287781] audit: type=1804 audit(1580382992.658:57): pid=8167 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir687532776/syzkaller.eABzyA/17/bus" dev="sda1" ino=16602 res=1 [ 142.304393] *** Host State *** [ 142.320940] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 142.333519] FAT-fs (loop2): Filesystem has been set read-only [ 142.335568] RIP = 0xffffffff8117a4e0 RSP = 0xffff888053e2f998 [ 142.357980] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 142.386209] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 142.392891] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 142.392899] reason=80000021 qualification=0000000000000000 [ 142.392904] IDTVectoring: info=00000000 errcode=00000000 [ 142.392908] TSC Offset = 0xffffffb17f626eee [ 142.392917] EPT pointer = 0x00000000a548b01e [ 142.392924] Virtual processor ID = 0x0001 [ 142.479494] FSBase=00007f29a590c700 GSBase=ffff8880aed00000 TRBase=fffffe0000034000 [ 142.499713] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 142.528752] CR0=0000000080050033 CR3=0000000060a33000 CR4=00000000001426e0 [ 142.566697] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff868018e0 [ 142.598647] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 142.622554] *** Control State *** [ 142.638376] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000ea [ 142.658372] EntryControls=0000d1ff ExitControls=002fefff [ 142.684687] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 142.713484] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 142.726998] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 142.745227] reason=80000021 qualification=0000000000000000 [ 142.763759] IDTVectoring: info=00000000 errcode=00000000 [ 142.778979] TSC Offset = 0xffffffb112fadd65 [ 142.789220] EPT pointer = 0x000000008503c01e [ 142.804230] Virtual processor ID = 0x0003 11:16:33 executing program 4: epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f00000001c0)) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ocfs2(&(0x7f0000000040)='ocfs2\x00', &(0x7f00000002c0)='./file0\x00', 0x8e8d, 0x0, 0x0, 0x0, &(0x7f00000003c0)='vmnet0+-selfeth0\x00') ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40186f40, 0x76006e) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) semget(0x0, 0x0, 0x200) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40186f40, 0x76006e) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:16:33 executing program 0: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000100)=""/35) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x501080, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000640)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000600)={&(0x7f0000000480)={0x2c, r4, 0x10, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0xe40f}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_DEBUG={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r4, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xfffffffffffffffe}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x80}]}, 0x38}, 0x1, 0x0, 0x0, 0x41}, 0x10) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x4b, r2, 0xc91add0bf88807dd, 0x0, 0x0, {0xf}}, 0x8c}}, 0x0) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0xf0, r2, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0xf0}, 0x1, 0x0, 0x0, 0xc008014}, 0x40010) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000003200090300000000efffffff000000000c00020000000000d250e2fb"], 0x20}}, 0x0) 11:16:33 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) get_robust_list(r1, &(0x7f0000000180)=&(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)}}, &(0x7f00000001c0)=0x18) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000040)={0x6, 0x8, 0x6c81}) fcntl$setlease(r0, 0x400, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$TIOCSBRK(r2, 0x5427) 11:16:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x8480, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'geneve0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8, 0xa, r8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000300)={'geneve0\x00', 0x0}) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r14, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x34}}, 0x0) sendmsg$nl_route(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_MASTER={0x8, 0xa, r14}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) r16 = open(0x0, 0x0, 0x0) fchdir(r16) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000700)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2000120}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xe8, 0x0, 0x900, 0x70bd25, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKMODES_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r17}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x8052}, 0x4000000) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x400002b7, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e8bd6efb250009000e000100400000ff050005001201", 0x33fe0}], 0x1}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/rt6_stats\x00') r18 = open(0x0, 0x0, 0x0) fchdir(r18) r19 = open(0x0, 0x0, 0x0) fchdir(r19) r20 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r20, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r20, r20, &(0x7f0000000240), 0x7fff) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r20, 0x4122, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r21 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x140, 0x0) recvfrom$rxrpc(r21, &(0x7f0000000300)=""/207, 0xcf, 0x40000066, &(0x7f0000000100)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @remote, 0x7}}, 0x24) r22 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) sendmsg$kcm(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f80ecdb4cb92e0a480e0a10000000e3bd6efb250009000e000300400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 142.905039] nla_parse: 6 callbacks suppressed [ 142.905046] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 11:16:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0xfffc, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x20, 0x70bd26, 0x25dfdbfe, {{}, {}, {0x8, 0x2, 0x7ff}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x20000010) [ 142.937890] audit: type=1804 audit(1580382993.308:58): pid=8167 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir687532776/syzkaller.eABzyA/17/bus" dev="sda1" ino=16602 res=1 11:16:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000003540), 0x1000) read$FUSE(r0, &(0x7f0000002540), 0x1000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x50) lsetxattr(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000180)={0x7, 0x6, 0x4, 0x2000000, 0x7, {0x0, 0x2710}, {0x4, 0x0, 0xfa, 0x81, 0x5, 0x80, "33a415fe"}, 0x7, 0x2, @planes=&(0x7f0000000100)={0x5, 0x0, @fd=r3, 0x7}, 0x23b6038b, 0x0, r1}) bind$bt_hci(r4, &(0x7f0000000340)={0x1f, 0x1, 0x2}, 0x6) umount2(&(0x7f0000000040)='./file0\x00', 0x2) write$FUSE_ENTRY(r0, &(0x7f0000000280)={0x90, 0x0, 0x2, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000002c0f}}}, 0x90) [ 143.016671] (syz-executor.4,8186,1):ocfs2_parse_options:1484 ERROR: Unrecognized mount option "vmnet0+-selfeth0" or missing value [ 143.032425] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 143.038550] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 143.050812] (syz-executor.4,8186,1):ocfs2_fill_super:1217 ERROR: status = -22 11:16:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000200)={'veth1\x00', {0x2, 0x4e21, @multicast1}}) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000140081563e060804000f000010ff0100000060003f03546fabca1b4e7906a6bd", 0x24}], 0x1}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r1, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000340)={'team0\x00'}) sendmsg$nl_generic(r3, &(0x7f0000000140)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0x2f8, 0x2e, 0x200, 0x70bd2b, 0x25dfdbfb, {0x2}, [@nested={0x2cd, 0x42, 0x0, 0x1, [@generic="a3f899b11815e1e718f81ba0d883895adc8b7943034f960d96d09306d32bdc9f095d2a2e101a90e1fd16cfd18e9711869a5fe2fd05ceb4dab0325a34db597abc4d225833d7dac4aafc91d24ac6d31ca2eac4e1237611d22852008f5684b2fb30307887af0901c2ca0ede286d9a89c5e4e9fa75408923503ee77019db2be13bfe5102b1e810355c0ff23f25068e557eebc879f97861d33fad30f55bf50daabaca94cd0ee299af5291cac4a1129ebcd600131aa972cc", @generic="d3fb56237834765c68849f43a7a04662c3f865cb3b83905528688f2e661a55bc3da70cb769de9d107f65342e409334c4186309466cdb170c455229a5d77419f0f8a45afec9ee5f11edb4a2ace97c1efc693f6504ea4571d4de6b8a398dcc61818058fd13aa224996cef3860c51e30bd5eb4b7d8d2fdd8a7009497a89f7fbec28d31fcb470b4003079f428fab03060215b1a1675cca5600615f6f7004e1f28f3aa1feb8a99b0204a03363e285dbd8481f225898e2e4dd3387ddb04d258cc2900dc4e0b69fd34a060920277450557e", @generic="3dac78dbc8d97bd502eb0f60b068c979f7a82150597796f2a8f84e305164d91eb238d68d19242b4b163b3544159242b09ffa7ef4f2b48c65d0161ba23054df902ad3f55bffbdd6aa41c5f56102115b9bb47df015cd968347ee7604da9e5c0b0e345ab52c4be4809d37884a635528652297ca3cb243bf097c810b9c7a2c12e4766bd541e2f3017cbfe8e457fda133023f727a90e16085cc98f9719423a3a816bfd23848569c004bc17fbcdea290d5cf47f9ae766f1d0575248de432ba31b4413f2a919123af7cceb8f8a0d3adb0d261ca77de62", @generic="a459f831881ac2daa832bd9f79b6d9ae08bc88894a55a3d2c6453607dfa021d80d9508b9d69e86db109f3ef36f3c4fa905ffd696fd0fd95c29d62abd11049ac1ba0c4694b95efd4167d7d7194b8c006a29685fe715784eab1a21f9b5e6f229c4aa68f98843d22425f4d7694cfbe5dfcd8f4e75"]}, @typed={0x14, 0xc, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, [], 0x39}}]}, 0x2f8}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) [ 143.080246] FAT-fs (loop2): Filesystem has been set read-only [ 143.092362] bridge1: port 1(geneve0) entered blocking state [ 143.098387] bridge1: port 1(geneve0) entered disabled state [ 143.134986] audit: type=1804 audit(1580382993.358:59): pid=8165 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir687532776/syzkaller.eABzyA/17/bus" dev="sda1" ino=16602 res=1 [ 143.136928] device geneve0 entered promiscuous mode 11:16:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x10000000000, 0x321580) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)={0x28, r6, 0x5, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_BEARER={0x4}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)={0x1e0, r6, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x13, 0x1, @l2={'eth', 0x3a, 'ip6erspan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'team0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x66}]}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4565}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6e5d}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x34, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x20000004}, 0x40) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0xfff1}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x3}}]}, 0x34}}, 0x0) r8 = open(0x0, 0x0, 0x0) fchdir(r8) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000640)={@in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x0, 0x0, 0x2b, 0x0, "426f46bef93c7935e77814699a1d0dce7fef9dfe57749eaf7e2d5981bdf3b5d4eb69e95a8065da5770264bf55d9b4bf103a6da0f822be1d493fc06407c0b829c0abab9d319aa8b9bb8340eea5fd20ee3"}, 0xd8) [ 143.181881] device geneve0 left promiscuous mode [ 143.187203] bridge1: port 1(geneve0) entered disabled state [ 143.242115] bridge2: port 1(geneve0) entered blocking state [ 143.247915] bridge2: port 1(geneve0) entered disabled state [ 143.277132] device geneve0 entered promiscuous mode 11:16:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000000, 0x0, 0x400, 0x6ab1}, 0x0, 0x400000, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f0000000100)=""/258, 0x102}], 0x1}, 0x0) getpid() r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/fib_triestat\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 143.301369] @: renamed from team0 11:16:33 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xe568a65d32d5906c, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) write$P9_RWALK(r0, &(0x7f00000001c0)={0x8b, 0x6f, 0x1, {0xa, [{0x80, 0x3, 0x2}, {0x20, 0x0, 0x4}, {0x4, 0x4, 0x6}, {0x10, 0x4, 0x5}, {0x80, 0x3, 0x3}, {0x80, 0x4, 0x7}, {0x1, 0x0, 0x6}, {0x10, 0x2, 0x8}, {0x8, 0x0, 0x1}, {0x1, 0x3, 0x1}]}}, 0x8b) r1 = syz_open_dev$audion(&(0x7f0000006100)='/dev/audio#\x00', 0x191, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r1, 0x80044dfb, &(0x7f00000003c0)) [ 143.363404] 8021q: adding VLAN 0 to HW filter on device @ [ 143.408454] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 11:16:33 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) write$sndseq(r2, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @control={0x0, 0x0, 0x1}}], 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) r6 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r6, 0x0) ppoll(&(0x7f00000006c0)=[{r0, 0x4118}, {r3, 0x2010}, {r4, 0x2000}, {r6, 0x80}], 0x4, &(0x7f0000000700)={0x0, 0x1c9c380}, &(0x7f0000000740)={[0x800]}, 0x8) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000280)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fremovexattr(r4, &(0x7f0000000640)=@known='trusted.overlay.metacopy\x00') fallocate(r1, 0x0, 0x0, 0x1000f4) r7 = openat$cgroup_ro(r1, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000680)={0x93, 0x1, 0x101, 0x8}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @empty}, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000600)=0xe8) ioctl$SIOCX25GDTEFACILITIES(r7, 0x89ea, &(0x7f0000000240)) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000040)="76d01e0ac0c03bb274e67016550746b38b481ca37a8ba01157ac19cc89f53598b05b96fd32a5f5fc013d4b0a176a65a28e1bc696cbd4aa535d931ccbc25e735658d26b253a5bc3231ddde7f89eedf0bcabcd01d340a50f025a15801d6722e2a4d315", 0x62}, {&(0x7f00000000c0)="927fb8fd30791fb6e7eac1bdcec7629fca4ad70f4f04a08370cb44f48b9ad0a31ece306ba2d059581765193a1100742c9ea577c5ea35906ae37793909bd44327a3e20729fe1c2314b04b517920849be89003f00217686a07a086d081d1ce5a2410c00a96d414f5e81bbbefe525f492c466b2c8604a6b52a54975272b4f5c31520682e15b0d8c9251f53018789a0cce99375d7c03f3547cbcf41e026a832b3d902fe09a8fd270fb", 0xa7}, {&(0x7f0000000340)="7fcd3071133b457f735f9e3a98a64a8da49cc4b4d8b50521aee30a9d68d4cd0a9049c852a5154bdaa81bb9b7c7eafce1b3b33d7c9f448bd7e25ff5081dbacce2e5ebed4617c342f2ca8914e6ce0fc3367bc7675f5887b4875bb2e9ae9a076991db5765fc54799a90c86a442321394be27b1d75652a9233c125e7c63fb97a9594544f840658839d6f31a69e6d856ee02882cc0f87300d6a1d9f6085b1e1f6e4f5ca60d05783420e845c8bfd5ba8075c354d6bc48dae2c57cd73f97e1e9e77e1", 0xbf}, {&(0x7f0000000400)="20354a6e11dd982f5d6eeecb859f79744ae31bb5db0db3af9ae2c2c9cc6635211942e49682281e2efb3396644e8e493e7bffa87ad7f9281644a8dea3f11e6133964477afc21f9cfb09a1138951b3ebc1f06ff7efcb2d51a8f7e4d21c7a83d183714a954698db1b7629500b6db5e66523255a97d1fc0a0ea8b87644dd495848bf8b1109682d19e36f8231faa5b02e58b60af707d7fff467b0fa2b3bd65577c2c4e40bd9e327c5de07ccb537903c014237ed632efa6f979105b54e3a8c9eed7096e4", 0xc1}], 0x4) [ 143.492553] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 11:16:33 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="5053000001000000000000005bab8d558829084a0c02000000000040110000000000"], 0x1}}, 0x2000c8c4) 11:16:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$peek(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0xffffff1d, 0x70bd2b, 0x0, {}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x24, 0x2, 0x0, 0x1, [@IFLA_BR_NF_CALL_IPTABLES={0x5}, @IFLA_BR_MCAST_HASH_ELASTICITY={0x8, 0x1a, 0x1}, @IFLA_BR_MCAST_SNOOPING={0x5}, @IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0x100}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x5c}}, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x65, &(0x7f0000000080)=[@in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e24, 0x1, @local, 0x5}], 0x3c) 11:16:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f00000000c0), 0x41395529) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002c40)=[{{&(0x7f0000000300)=@tipc, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000480)=""/157, 0x9d}, {0x0}, {&(0x7f0000000700)=""/106, 0x6a}, {&(0x7f0000000780)=""/30, 0x1e}, {&(0x7f00000007c0)=""/198, 0xc6}], 0x5, &(0x7f0000000940)=""/176, 0xb0}}, {{&(0x7f0000000f40)=@caif, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000a80)=""/67, 0x43}], 0x1, &(0x7f0000000c40)=""/157, 0x9d}, 0x4}, {{&(0x7f0000000d80)=@nfc_llcp, 0x80, &(0x7f0000001140)=[{0x0}, {&(0x7f0000000e80)=""/106, 0x6a}, {&(0x7f0000000f00)=""/17, 0x11}, {0x0}, {0x0}, {&(0x7f0000001080)=""/191, 0xbf}], 0x6, &(0x7f00000011c0)=""/180, 0xb4}, 0x7}, {{&(0x7f0000001280)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000001740), 0x0, &(0x7f00000017c0)=""/121, 0x79}, 0x900f}, {{0x0, 0x0, 0x0}, 0x6}], 0x5, 0x10022, 0x0) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) preadv(0xffffffffffffffff, 0x0, 0x0, 0x800000) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f00000002c0)=0x1, &(0x7f0000000380)=0x4) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000940)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmmsg$sock(r6, &(0x7f0000001400)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@txtime={{0x18, 0x1, 0x24}}], 0x18}}], 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe0, 0x0) r9 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r9, 0x29, 0x2d, &(0x7f00000004c0)={0xff, {{0xa, 0x4e20, 0x469, @mcast1, 0xfffffea6}}}, 0x88) setsockopt$inet6_int(r9, 0x29, 0x8, &(0x7f00000000c0)=0xfffffffffffffffc, 0x4) getsockopt$inet6_buf(r9, 0x29, 0x6, 0x0, &(0x7f0000000000)) r10 = accept4(r9, &(0x7f0000000140)=@caif=@util, &(0x7f0000000000)=0x80, 0x40800) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r12 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r11, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="1af5eff25331f2c060d7f77959a2f8d4cb0baf48ba8a8d24a25bf5f947d295fb747f57b749cf9c62d9a5ff3ada239f3b62d2e25f348b729db5ccf8a8c771329c6867a9e6d3616c829a9eb1c09f0794b0d3760f6b", @ANYRES16=r12, @ANYBLOB="02002bbd7000ffdbdf250200000c080002"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r10, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)=ANY=[@ANYBLOB="9f88f590", @ANYRES16=r12, @ANYBLOB="020028bd7000fbdbdf25020000000800020003000000080002000100000008000100020000004c0004800800020003000000d4000c80e4000880"], 0x238}, 0x1, 0x0, 0x0, 0x40040}, 0x2004c010) sendmsg$NLBL_CIPSOV4_C_ADD(r7, &(0x7f0000007bc0)={&(0x7f00000079c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000007b80)={&(0x7f0000007a00)=ANY=[@ANYBLOB="44010000", @ANYRES16=r12, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) sendmsg$NLBL_CIPSOV4_C_LISTALL(r6, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)={0x190, r12, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x18, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7c85}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x412cc459}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x148, 0xc, 0x0, 0x1, [{0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x93a6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe72b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3cd2d1de}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x393e1758}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf0a6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdc29}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5b531cca}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x173b61eb}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5f05}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x785a97bc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x12bf406b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf450}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd6f}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc429}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4337}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x767d}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x59d54399}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xef67}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4bbd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2dc7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5c60}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4b4e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x81c4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x716a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x72cee822}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x61fd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24dcf855}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3b12bb26}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaf36}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3e802a19}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1a3d98bd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f20d7e4}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa7e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf572}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc30e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb896}]}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x80}, 0xc000800) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000001300)={0x2e4, r12, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x1b8, 0xc, 0x0, 0x1, [{0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcd0f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x103ce7ac}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5467c18f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa97c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa99}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x33de}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4b68cb10}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x254281dd}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x505491e1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2109fa7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3aaab8f0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd0aa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x25a7e0de}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7d3add94}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2e5d}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x45bf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4777d6dc}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2edd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x57a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x584f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3698e5ec}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x42656264}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x23ff75aa}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x48f0c976}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9425}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1c081130}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x368f6254}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xab39}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x166d5b9e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4f1e68}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x31fc}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7545b911}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x19ed42f3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x663fd1f1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d786ea0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd088}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76491e3a}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcc6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7c83d381}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x21f11213}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe0ec}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6ff}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x537e30b7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x14d2ee1d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2fe06159}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x8cb1ed0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9f9f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7d55}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdfef}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb87d}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5}, {0x5, 0x3, 0x7}, {0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xa8, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x34aa5808}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x36}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x610b54d9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x80}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7fd29ea9}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b7d3db7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xff}]}, {0x54, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5834e2af}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2b0705d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x97}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7ba3cf63}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x30968a75}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x20004800}, 0x4000) poll(&(0x7f00000007c0)=[{r5}], 0x1, 0x0) ioctl$IOC_PR_PREEMPT(r5, 0x401870cb, 0x0) ftruncate(r4, 0x2008001) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r13, 0x117, 0x1, 0x0, 0x0) r14 = accept4$alg(r13, 0x0, 0x0, 0x800) sendmmsg$alg(r14, &(0x7f0000000a40)=[{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000001840)="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", 0x1000}, {&(0x7f0000000b00)="2b18089d7ada8a1fe16a749623b9eb7c6cf860a0574787d09bac156614fb7704dd422493f209bada042ae2e090415b3cfde0843724a6a243be062814bb7cd70894fc24c0d72595217d164bf4aa966dd22b9adba97f74fcd67c662ab1ae1505ca668cd3e70591a0d7fd4882faee1f05dfd1ded973c587019d10f6e02a60f5eb43ef130910e3e0290125166f29a8c6f29b6376b0f2806aad1d008e510808931e016b8572106727d305ca28f48bec19727bfa64f37b86c4d1167dd20cdc9d26b2b3ad", 0xc1}, {&(0x7f0000002d80)="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", 0x1000}, {&(0x7f0000000fc0)="33dc7bac8d5d1262c577c67fcbabc4f2fa86b5bb20b8a6be34c7ce09fb41323d71392ae89882107a89810f7f448e63c32a639c86743005ae64a199aca49217381508abf5ddb40b7c4e742ae60b5bb5f211b800c7c1fc4d5544f6abddabf7018575dfbc13533083c0f68295acd4a018700ec1406985880e662bbc590cf7cf1397804aa5", 0x83}, {&(0x7f0000000600)="607e2ff61ea4366a3e7b3e38d5d950517b9d42e729697e8678c7569d79844991fe99c6ad5313a74e4078f5b465e923d4aebd5c7fd35ca901e9c8bcfbf5bf6ef4c5504c", 0x43}, {&(0x7f0000001600)="21ad0eed8f9b2393b3882c78d5a6082bc7faee353d0b0439295c3e68eb52dd44f68afe9e70aa7f8ea9f4247f36681db913a29ac1119b511c7988e5baefb4dda614c4c003044d9ec726e9d06c2247f2f3069a1d6e76de24c5b52887f263fe46c0390eb936e44d72c361273023ea2516938f7f2bc04e74eee03b8967e59889b937c19104f8d39a4b3220945e032e7e26207bddc3b69ad6", 0x96}, {&(0x7f0000000a00)="fc1daeb574db76eba3ee8b7e274e11b42834990041b715d92b906ed795949094e8ddcfe9fee3ab9d554a737d94689c6d414e3b2de70d6df01d", 0x39}], 0x7, &(0x7f0000002840)=[@iv={0x98, 0x117, 0x2, 0x81, "30c746967a727c7aefbdb6f5f1a9f28e295af88c14e55a4335f77c2a59b74801cd173a8a6db16c9d7cb1a1b3bc684738bc819f0b8266ebcc6d8966ab45c004fa92645adea20c2da2401c2180aaf28c8b81fd9d2e53d0176891d00c84d76b2d276d7f81083292bbadfb19f86a01eb009496759225d1d3a2019a040240cfb6e9498c"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x6}, @iv={0x78, 0x117, 0x2, 0x5e, "276a8580866c42a82bca10f220f46ef87b65bd59d891dfd9ff351437d54e47d99032f7237af4fdf1cb40d0be3c5091065ce0ba5276847dd7b81ee060c5a910e693c4a2be1b0fc1fba33defbbd2741c09c09997427083ab873eb48d5f7b28"}], 0x170, 0x20008880}], 0x1, 0x0) creat(0x0, 0x1) [ 143.813869] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 143.832633] device geneve0 left promiscuous mode [ 143.838247] bridge2: port 1(geneve0) entered disabled state [ 143.918161] bridge1: port 1(geneve0) entered blocking state [ 143.928191] audit: type=1804 audit(1580382994.308:60): pid=8247 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir263147610/syzkaller.8tgyRC/20/bus" dev="sda1" ino=16618 res=1 [ 143.934028] bridge1: port 1(geneve0) entered disabled state [ 144.104956] device geneve0 entered promiscuous mode [ 144.122143] device geneve0 left promiscuous mode [ 144.138357] bridge1: port 1(geneve0) entered disabled state [ 144.219916] device lo entered promiscuous mode [ 144.229386] 8021q: adding VLAN 0 to HW filter on device @ 11:16:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) dup3(r0, r1, 0x0) dup2(0xffffffffffffffff, r1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) getsockopt$inet6_int(r4, 0x29, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) r5 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x69e, 0x400000) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r5, 0x2) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 144.260503] Y­4`Ò˜: renamed from lo 11:16:34 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x80}}, 0x30) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 11:16:34 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) getuid() getegid() r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000000)=0x1, &(0x7f0000000040)=0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r2, 0x0) r4 = open(0x0, 0x0, 0x0) fchdir(r4) ioctl$PPPIOCGFLAGS1(r4, 0x8004745a, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f00000001c0), &(0x7f0000000200)=0x2) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r5, 0x0) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYRES32=r5, @ANYPTR, @ANYPTR64, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESDEC=r0]]) [ 144.519725] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 144.569515] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock 11:16:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x114}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) socket(0x11, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x41, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r1, 0xc004500a, &(0x7f0000000100)) sendfile(r1, r0, 0x0, 0x1c01) eventfd2(0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x501100, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) [ 144.630000] audit: type=1804 audit(1580382994.998:61): pid=8243 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir263147610/syzkaller.8tgyRC/20/bus" dev="sda1" ino=16618 res=1 [ 144.677674] EXT4-fs error (device loop0): ext4_iget:4727: inode #2: comm syz-executor.0: root inode unallocated [ 144.715752] EXT4-fs (loop0): get root inode failed [ 144.764255] EXT4-fs (loop0): mount failed 11:16:35 executing program 5: r0 = open(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xc880, 0x1a5) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20000008) r1 = open(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x7e347167a160ab4d) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') 11:16:35 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}, 0x18) sendto$inet6(r1, &(0x7f0000000100)="cfafe990db3d3009d124297b1ac617fe8623f1863d9a0585380ea0a19f7f9f652df286d072feaf8203859ca2f6c27b4d07833294aa57f215064ffe87843c60bd41c4a7e0fb6c0133dc7c465208d59778b2212c3fc7ecb0dad5e3d0542256cdff71e68889b2c834fa5748024b6e0c92ca98d0f65351fff8c4a5000000000000", 0xb559, 0xe00, 0x0, 0xfffffffffffffdd5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x3, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'netdevsim0\x00', {0x2, 0x4e24, @local}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x2c, 0x80000, 0x1) accept$netrom(r5, &(0x7f0000019840)={{0x3, @default}, [@bcast, @null, @default, @null, @remote, @remote, @bcast, @null]}, &(0x7f0000000240)=0x48) recvfrom$inet(r0, &(0x7f00000002c0)=""/102385, 0xffffffffffffffc1, 0x0, 0x0, 0xfffffffffffffe56) [ 144.830264] audit: type=1804 audit(1580382994.998:62): pid=8248 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir263147610/syzkaller.8tgyRC/20/bus" dev="sda1" ino=16618 res=1 11:16:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='.//ile0\x00', 0x80) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, &(0x7f00000003c0)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="0200000001000000000000", @ANYRES32, @ANYRES32], 0x3, 0x0) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x48, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x8) 11:16:35 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a0000000600000000000000000000000500d51d00000000060000000000000001000000000000005c00"], 0x2a) r2 = eventfd(0x5) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af22, &(0x7f0000000080)={0x0, r2}) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r3, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000000)={0x1, 0x1, 0x1000, 0x1000, &(0x7f0000000380)="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", 0xf4, 0x0, &(0x7f00000000c0)="084d60c7c3f22f4ff637a643920372ce0c5e0812a6a93ffc7d00ec578aa41751462c86a8631b749d8ac025443d48d848b222bc229fd3d50f818169464692a912a9be19a427259215e1173b82dbf88cdb79081c994df149bd336329c1717640de0e2c616a7ec67c529b3711576c58db46c3b3236af8b8ceeecb379967a0c7c8f12649cd9bde6217d7a47769834eaf56a381a304ab7ab977fcf9d4cc59e4106970a81d3e332a28f825ebb16d931473ceab88b4cf70e2f15090d5e223e8449d2c3907cbb5642f46a94c162ff09290de38911117b5622a1ec2ab12848dca13b43748d9fd6c0196b245f9f63f192447da1bc5266f10a1"}) dup2(r0, r1) 11:16:35 executing program 5: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e064000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000800)='trusted.overlay.nlink\x00', &(0x7f0000000840)={'L+', 0x8}, 0x16, 0x3) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) r2 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r2, 0x0) write(r2, &(0x7f00000008c0)="aebf16743384845bb51bad9c45398f2291b29962fbb8897499f10bd04510dc9f31668dac", 0x24) ioctl$SNDCTL_DSP_SYNC(r1, 0x5001, 0x0) r3 = accept4$unix(r0, 0x0, &(0x7f0000000000), 0x800) sendmmsg$sock(r3, &(0x7f0000002f40)=[{{&(0x7f0000000140)=@l2={0x1f, 0x2, @fixed={[], 0x10}, 0x4, 0x2}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280)="9c7990b1088fe2ffc862e00c3aab99c13760c830b7de60079b183c8445a105d7b43073a3555b1fe04d60880fac5f3e61aaaa100b44f5f7f82d73a77f3c04db27f1cca0c83aadee41c70bda4127ef6e5453d4b03a4123b47449bf77cccef4d1ef1058b44e6f2bcb4cd810aedef1e0d181157a2925e323b69cb0d96034782563fc6496ade5794c5581fbf72dfd5436ae865a50b016976958b29950a055beb2f7cf5c311d049661d5b2", 0xa8}, {&(0x7f0000000340)="c708379733c825c96c309a003daa2ed049f3f0afa7111e05d3b490162aa263956192f859f8e45cdd731ed7e381ce9567a33da292985542bd9e821ec96b5c4c7e4211f649dec5e51063303e582eeed007467d6903d8eca93cbeac70af4126e06cb31e071f158ecc7ea9da95e3742a0ec90f90010f3c0b97cd96bee76c006a76acc8a5960a089996f687b2ef0ba870eb964aaf5dd696ab354f3e99085ace35d2e8ffeb244f", 0xa4}, {&(0x7f0000000400)="c56c830cc2ea9eead2adda0b0fc39a28d4302a7a8c030b2d77489d85c4ebc325835821325101824048bab2ae34db631974b955bf1aeca6c04481d6c2b7c0653c41a05ade086a528b3ae05c0623bac03d22e19135423158b658fc05f0b7277baf2f1434d70c6c6a98ca61b975f57b1b303d795b74b45939544ca81ebf9605aae37e1778b135e842b09a9c25e21b3100e0bb8f62a5dc678631889f6eafafde24cfa9bbe6db4abfbf0b30fc7c14260697d595f47d4ea4175f2720ce2c4947f1e5c4df31f9cc571e5e7de35b9660a4a35881a4e1479095ece0f3c5522a14a4f967d101981743", 0xe4}, {&(0x7f0000000500)="a6214b4bcc990237deafd8940c8ca50499c2a91949fe3369f43f554c75bab87155e0480571cdec16a696cdfc660c8b4c7ef655056f9f472363598c0e8b81271b47b1bce9a35c791c37c8d8b440139e610b50f41af00fde867325b8af4cb848604e408085b2eaa88d05047b4d4820cf762ccd61cfca5b768e7078630545aa8cf1cf8227f0d6e0c78030fd9e400023e57c1877bc428af70bf54455219d111065329988c44d82bb92fcd8e1d34e27389038f2c6320629787c06b2152a2eae", 0xbd}], 0x4}}, {{&(0x7f00000001c0)=@llc={0x1a, 0x0, 0x6, 0x1b, 0x81, 0x0, @broadcast}, 0x80, &(0x7f0000000780)=[{&(0x7f00000005c0)="bedbf1590fea9793c20ff6fa82f4de7654ef58", 0x13}, {&(0x7f0000000600)="f5c2b92b116382489603f4bcadfa3c257084b7e0af36183be9334294aa5fe84841df16ed3a7a760cdf40121d21ebdda5b3ecc6fbb6e0", 0x36}, {&(0x7f0000000640)="fe4f25865cb89550", 0x8}, {&(0x7f0000000680)="da379a168d865615abaadef1fa17737b8beb9dc7105752f4abf61013be7bc8c0e9848af8550051f086bb14d6b1bec1091aed1a494d2ba5d550018d527288881033beba49daa76ddf8ef59f63a1a2de9148b6ba691820acb4c2a4ed03881fd19201a626c5d32a6a76665a2469feabe0b7feb725771a5f87044320ce3e783bb256928b1b73d2233829e439ba2894a65f71e0d428ba485b2a42cd2599990b428df3110a9bbfc68bae288f621f69d99c3a42d7c4a292d88fd355e19b3c8e021045f7f839aa1c9104586f215968bac55768959298950be705b2a39bd1cae6e0565f", 0xdf}], 0x100000000000015c, &(0x7f0000003040)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14, 0x1, 0x24, 0xffff}}, @mark={{0x14, 0x1, 0x24, 0x40}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x100000001}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}], 0x90}}, {{0x0, 0x0, &(0x7f0000002d80), 0x9, &(0x7f0000002e40)=[@txtime={{0x18, 0x1, 0x3d, 0x9dcd}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x644}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x38}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x200}}, @mark={{0x14, 0x1, 0x24, 0x9}}], 0xf0}}], 0x1a, 0x2004000) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fstat(r4, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000940)={0x8, 0x0, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setuid(r5) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f00000007c0)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r5}) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000880)) 11:16:35 executing program 4: r0 = open(0x0, 0x0, 0x0) fchdir(r0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000040)={0x7, 0x9, 0x4, 0x1000000, 0x40000000, {r1, r2/1000+10000}, {0x2, 0xc, 0xfe, 0x80, 0xf9, 0x27, "763b1e0c"}, 0x12, 0x2, @fd, 0xa88, 0x0, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r4) close(r4) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={r5, 0x0}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000500)={r5, 0x10}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) r7 = getgid() lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000000980)={{}, {0x1, 0x6}, [{0x2, 0x1}], {0x4, 0x6}, [{0x8, 0x0, 0xee01}, {0x8, 0x3, r7}, {0x8, 0x4}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x3}, {0x8, 0x1}, {0x8, 0x4}, {0x8, 0x7}], {0x10, 0x4}, {0x20, 0x5}}, 0x74, 0x0) lchown(&(0x7f0000000100)='./file0\x00', r6, r7) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f00000000c0)={r5, 0x22}) syz_emit_ethernet(0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="4000000090780000"], 0x0) [ 145.270875] overlayfs: failed to resolve './file1': -2 [ 145.335887] Unknown ioctl 21569 11:16:35 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 145.367848] MINIX-fs: bad superblock or unable to read bitmaps 11:16:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000640)=@file={0x0, './file1\x00'}, 0x6e) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, &(0x7f00000003c0)) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="020000000300000000000000", @ANYRES32], 0x2, 0x0) connect$phonet_pipe(r1, &(0x7f0000000140)={0x23, 0x0, 0x2, 0x7f}, 0x10) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, 0x0) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x48, 0x0) [ 145.412903] overlayfs: failed to resolve './file1': -2 [ 145.429748] Unknown ioctl 21569 11:16:35 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x8000) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x111001, 0x0) sendmsg$IPSET_CMD_SWAP(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x6, 0x6, 0x5, 0x0, 0x0, {0xd, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040800}, 0x40) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000af00000000040000000000001e35b89be8", @ANYRES32=0x0, @ANYBLOB="7fff000000000000140012000c0001006d6163766c616e00a6ff02000a000500040000000000000008000a00", @ANYRES32, @ANYBLOB], 0x48}}, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f00000002c0)={0x53, 0x6, 0x6, {0x20, 0x101}, {0x7, 0x3}, @const={0xc7, {0x3, 0x2, 0x0, 0x4}}}) r4 = getpid() tkill(r4, 0x9) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000380), 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000240)=0x10) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x7, 0x101000) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 145.477927] MINIX-fs: bad superblock or unable to read bitmaps [ 145.610114] audit: type=1400 audit(1580382995.978:63): avc: denied { setopt } for pid=8321 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 11:16:36 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000200)=ANY=[@ANYBLOB="05000000000000002000000000000000ffff000000000000feffff0100000000cba27813000000000000000000000000070000000000000004000000000000000600000000000000000000000010b5000600000000000000ea5db30a3950ad4a42f7516102189a409cf231d0d6acb361b015c6516c3460aec0dbea814dd02da9c8c349ecd110592b871bb53f0f61506fce92ce0311a2"]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f0000000140)=ANY=[@ANYBLOB="89230020808b349b396c", @ANYRES32=r1, @ANYBLOB="000000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video1\x00', 0x2, 0x0) 11:16:36 executing program 3: inotify_init1(0x0) accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @netrom}, [@rose, @netrom, @rose, @remote, @remote, @netrom, @default, @netrom]}, &(0x7f0000000080)=0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) io_setup(0x0, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x402c82, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x20, r2, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0xffffffffffffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2}, 0x47c) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr=0xb72}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000340)={'team0\x00'}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x24, 0x0, 0x20, 0x70bd2a, 0x8, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xb9a}]}, 0x24}, 0x1, 0x0, 0x0, 0x48014}, 0x24040080) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) dup(r1) getresuid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0)) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x44870, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}, {@default_permissions='default_permissions'}]}}) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 145.710235] Unknown ioctl -1054845647 11:16:36 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:36 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00'}) sendmsg$IPCTNL_MSG_CT_GET_STATS(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x5, 0x1, 0x5, 0x0, 0x0, {0x0, 0x0, 0x4}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x880}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in, 0x0, 0x1, 0x0, 0xfc}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) 11:16:36 executing program 5: mkdir(0x0, 0x0) symlink(&(0x7f0000000140)='./file1\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6d6f64653d303030303030303030303030303030b03030301f3034302c6d6f64653d30303030303030303030303030303030303030303737372c6d6f64653d30303030303030303030303030303030303052303030352c6d6f64653d30303030303030303030303030303030303030303230302c6d6f64653d30303030303030303030303030303030303033323334362c6d6f64653d3030303030303030303030303030303030304e4b00000000000064653d30303030303030303030303030303030303030303030362c6d6f64653d30303030303030303030303030303030303030303030362c7375626a5f757365723d76626f786e6574316e6f6465762a73656c662c7065726d69745f646972656374696f2c00"]) truncate(&(0x7f0000000100)='./file0\x00', 0x0) [ 145.784611] overlayfs: filesystem on './file0' not supported as upperdir [ 145.792019] Unknown ioctl -1054845647 [ 145.822561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8355 comm=syz-executor.0 [ 145.874646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8354 comm=syz-executor.3 [ 145.911134] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=261 sclass=netlink_route_socket pig=8364 comm=syz-executor.2 [ 145.995748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8355 comm=syz-executor.0 11:16:36 executing program 0: r0 = syz_open_dev$mice(&(0x7f00000008c0)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000900)=0x6, 0x4) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) syz_open_dev$sndctrl(0x0, 0x1f, 0x400) fchdir(0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r2 = socket$inet6(0xa, 0x80000, 0x2) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x8, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000100), 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f00000003c0)={0x237c00, "676ad6aef4ae29aec587263db1f92bacf2e05bbb319167a4409594f335022575", 0x1}) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000440)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='uid_map\x00') writev(r5, &(0x7f0000000100)=[{&(0x7f0000000000)="2af6b0b5299a990c03bbce11b1ab3df02c17eab0e1eecdd29d5a1ae0537419729db429a295a8c348f40b948e857ea1348a0d26821ccb5cfd0753c5f9ce091ebaade97b7ead5bf5c84db6cbb2b7", 0x4d}], 0x1) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) write$P9_RGETATTR(r2, &(0x7f00000007c0)={0xa0, 0x19, 0x1, {0x88, {0x8, 0x3, 0x8}, 0x8, r4, r6, 0x7ff, 0x0, 0x0, 0xfffffffeffffffff, 0xffffffffe573682d, 0x0, 0x0, 0x0, 0x401, 0x5, 0x2, 0x81, 0x2, 0x100000000}}, 0xa0) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000880)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r7, 0xae04) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x0, @local}}, [0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff]}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f0000000640)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba72764f460593d41d43e9f589502652fe815ef1da2c2675e828d69536eb96c2c27f564dcc44d2a18bf98a8698f09764ff95bda5a0520964e8e84670e557cc255a621254e23c5e3afd68721e31a0caa4ac9e40a612dd4bff3553cc00a47f618b8289ce1086193ea338ae5473fc048d1e696a52f65d00d34ed03cfb8125020463ba3054af5f7a2fd4c733242927960b07d0d81f303157417af8907b820d74a1dc84ea78e317584a11da56d5842dec5823a376d939a621adf86c8297db303ab14b7fa0cfa4316987c1ac3303f6acdaa8a946496cb09a6a0785a49f67cfe7725ff477933e4f38d99e6062f1bec6c4e857d64a8ba966cc4c024177bb10e4f5c05db8e7d4cd2437cff4067d9c6f68d8faf4342112a53e640e2c070ed68a364a209139ad", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) 11:16:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) setitimer(0x2, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000080)) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xfffffffffffffd4e}], 0x1000000000000125, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f", 0x21) set_tid_address(&(0x7f0000000140)) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast1, 0x15}) ptrace$setopts(0x4206, r0, 0x0, 0xa) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x80000000, 0x0) 11:16:36 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 146.352448] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=261 sclass=netlink_route_socket pig=8371 comm=syz-executor.2 11:16:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) sched_setattr(r0, &(0x7f0000000180)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x100}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x30000010) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) fcntl$setstatus(r4, 0x4, 0x44000) write$ppp(0xffffffffffffffff, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r6 = getpgid(0xffffffffffffffff) sched_setattr(r6, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x80000001, 0x3, 0x0, 0x0, 0x100000001}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0xa8802, 0x0) r7 = shmget(0x2, 0x2000, 0x100, &(0x7f000046f000/0x2000)=nil) shmat(r7, &(0x7f0000478000/0x4000)=nil, 0x4000) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r8, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @ipv4={[], [], @loopback}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, r9}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 11:16:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 11:16:37 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 146.613671] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8367 comm=syz-executor.3 11:16:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x3}, 0xb}, 0x1c) socket$isdn(0x22, 0x3, 0x23) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmmsg(r2, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0, 0x0, 0x0, 0x0, 0x7}}], 0x400000000000107, 0x0) 11:16:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00'}) ioprio_get$uid(0x3, 0xee01) sendmsg$IPCTNL_MSG_CT_DELETE(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x62179a7fb253c3b6}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xd4}, 0x1, 0x0, 0x0, 0x8000}, 0x4010) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008003, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 11:16:37 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 147.027864] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pig=8430 comm=syz-executor.0 [ 147.050708] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pig=8431 comm=syz-executor.0 11:16:37 executing program 0: mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) sendmmsg$nfc_llcp(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)={0x27, 0x0, 0x1, 0x5, 0x0, 0x7, "07808dad02af7b66d606075ec4cb6a15fd3bcb9f5df6589584a287aaa20e3a04bf21e12d35171921ac44e3ae2b635d5d0fcb4ebdc2fdeb42995045a0ffaaaf", 0x2b}, 0x60, &(0x7f0000000040)=[{&(0x7f0000000ac0)="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", 0x1000}], 0x1, &(0x7f0000000380)={0xa0, 0xff, 0x2, "ca48a585314684723ee3b20d7c5522c01afdb146dc7f94203ad2e45dd8b463f665841ea2a26d2441e24e7adcc907b2582008d21eb969b905063576679753c16e6b84dfd85b765411ca3dc8aad8559c9606f0cf77dcc25c5742889b81323c43853862bc4218b4c9214674719202334f2154fbb0a1613ba75cacaeb5c7e4e637ca4dc4e4373524c81cbde46efbf1e81f"}, 0xa0, 0x4000800}], 0x1, 0x4) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"]) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 147.171630] overlayfs: unrecognized mount option "]ps{œešO¤ø/file0" or missing value [ 147.225215] overlayfs: unrecognized mount option "]ps{œešO¤ø/file0" or missing value 11:16:38 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/keys\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x100, 0x8, 0x29, 0x93, 0x1, 0x3c299325, 0x2, 0xffff}, &(0x7f0000000040)={0x6, 0x9d3, 0x401, 0x8, 0x6, 0xfffffffffffff800, 0x459, 0x1ff}, &(0x7f0000000080)={0x4, 0x5, 0x0, 0x6, 0x0, 0x7fffffff, 0x5, 0x7fffffff}, &(0x7f0000000100), &(0x7f00000001c0)={&(0x7f0000000140)={[0x4]}, 0x8}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x348, 0x0) 11:16:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfafc, {{0x19000000, 0x0, 0x0, @rand_addr="27909b2d67ac0dcded3ed7eeca670d08"}, {0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, r1}}, 0x48) r2 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x2000000080, 0x40) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000380)={0x0, 0xfffffffffffffffb, 0x0, 0x2, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000000)) 11:16:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001500)='/dev/uinput\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r1, 0x0) r2 = dup(r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="a7800000000000000000010000000000000000000000000000001090bac4a2429288a649c72acbdfee185f416d68c52a8d0c2d05183d9aab2d3dfe3afb09ef01839fd2eba9da1e7fcad335e86543f4d793c6dc5dc5bd5868ae2d836980"], 0x3}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r4, 0x20, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000088) ioctl$UI_GET_VERSION(r0, 0x8004552d, 0x0) 11:16:39 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000100)=0x1, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x10000000, &(0x7f000000b600)=[{&(0x7f000000b500)=""/153, 0xfcec}], 0x1}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b653295096", 0xa) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000140)={r2, 0xa4, 0xb1}, &(0x7f0000000200)={'enc=', 'pkcs1', ' hash=', {'blake2b-256-generic\x00'}}, &(0x7f0000000280)="6e075fb8cf653812d4cc8a6f1496337d3e0faef46c13910a066372bb1fc99965a6fe5a249b74dbf18366bc5f507ac41a34c732e3c1bb5bd52b843a6f2dd82863d11d81e0b6909990dd3bdc149ae73f818fdb2f7e30b50d0b961bf79aacc99ce8175f2efd2895b87fa8d359ee6e281729c59f6e78a2f79a4023679a61286a25346eb3f11a9458e5517669e43e1f57b3f7cafac7ccaf174f21278d91686073c12e3355a0ca", &(0x7f0000000400)=""/177) fsetxattr$security_ima(r0, &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)=@v1={0x2, "e21029"}, 0x4, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000000c0)={r7, 0x1, 0x6}, 0x10) ioctl$sock_inet_SIOCSIFPFLAGS(r8, 0x8934, &(0x7f0000000340)={'veth1_to_bridge\x00', 0xb2}) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r3, &(0x7f0000000180)="0503000006003e0000000100c52cf7c25975e605b02f86ddeb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) 11:16:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_bp={0x0}, 0x8040, 0x0, 0x0, 0x8, 0x100000}, 0x0, 0x7, 0xffffffffffffffff, 0xb) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) fchdir(r0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000180)=0x40) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) setpriority(0x2, r1, 0x8) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x1, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008004}, 0x200000d1) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/88, 0x58) r3 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000000), &(0x7f0000000140)=0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 11:16:39 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x400, 0x84000) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f00000000c0)) semop(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000180)) r1 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000540)="cd7ecf40083fdf55ff23ffb0f0dd3d002dbf481a4f776e99a0b8e95e6ff774d608877736f9e3dad8d9cfc3a197914eebc47ddff45e26ae14b487905af9b8daf279dcf3b58b0000744f0b8192d74cb762e14990b11913ff3c326e8ddb5b431d7649a6d4ee17aa013028572886d49765f37ad907a93ddfa81f253cb71ecde1b063b1408687b2c06ff20b9feedd9a94a6cfd1955f12bec6e13a0546d63a157d4c32c54fdadf09237601d7aa030f943631164fa0a42d9eede522078d69b4432603f988977b44cb86b4", 0xc7, r1) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000040)=""/82) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r2, 0x7) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket(0x0, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) socket(0x10, 0x0, 0xfc) close(r4) 11:16:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000140)={0x100, 0x2, 0x132c, {0x80000001, 0x1}, 0x7}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x4b, r2, 0xc91add0bf88807dd, 0x0, 0x0, {0xf}}, 0x8c}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x60, r2, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0xc000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) r4 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x2, 0x1d4) ioctl$SOUND_MIXER_READ_VOLUME(r4, 0x80044d0f, &(0x7f00000000c0)) [ 149.247518] device team0 entered promiscuous mode [ 149.258959] device team_slave_0 entered promiscuous mode [ 149.306514] device team_slave_1 entered promiscuous mode [ 149.797721] FAT-fs (loop2): Unrecognized mount option "Re˜ùšHrorT$óv¡±ue" or missing value [ 149.905326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8489 comm=syz-executor.2 11:16:39 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, &(0x7f00000000c0)=0x9) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r2}]}}}]}, 0x38}}, 0x0) 11:16:40 executing program 2: syz_mount_image$msdos(&(0x7f00000007c0)='msdos\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="526598f99a48726f725424f31876a1b11e75652c00"]) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00'}) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080)='NLBL_CIPSOv4\x00') r2 = open(0x0, 0x0, 0x0) fchdir(r2) ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f0000000240)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0xffffffffffffffff}) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd4, r1, 0x4, 0x70bd29, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x44, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e3e1c6b}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x30}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x81}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x67352946}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5e7a155b}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x74, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x598fe910}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1804}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x73f0659c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24fc3df1}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbcd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76b13c4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x34b5b46f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3952}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6349}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x54ee0599}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x71dfb71e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x20e63f50}]}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x200080c0}, 0x20040014) 11:16:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r0, r1, 0x0) dup2(r5, r4) 11:16:40 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:40 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 150.191178] FAT-fs (loop2): Unrecognized mount option "Re˜ùšHrorT$óv¡±ue" or missing value 11:16:40 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x246002, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000100)=0x80, 0x2) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="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", 0x140}], 0x1}, 0x48c0) 11:16:40 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00'}) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r3, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r4, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000c80)=ANY=[@ANYBLOB="9000000010003b2408e623b0fb914371e9db5600", @ANYRES32=0x0, @ANYBLOB="b5219e774b00000008000300", @ANYBLOB="511503c7331940c575922ead692eea69b8f164ea6122a606990103d588e2925bedf8aea3ed07e3afa97d17abbded33d665beaae82f1ef0aed6d9f0d644f1d02d96be5b4f91db2577d480512a626a02fe2c0d5bd4ef5cb888caecd1a0ae8cfcad0d52ec87c29315d54c2694578711568a26057dd140c0fd22f9f15affad08e9508d141d914046092c999d966cf60ffc5da5b1cde68e99cb96c1f99c0495f130e9585d6b055069094c208c3228eef3c6c9a6570f96848ef7f299ca714e2a2c6b256e6898e4023491359977fefbc1d5b6af4f70f617f15d2e3d67ded65b", @ANYBLOB="2c86c515462223e9e3bd9387d309e4d5f0352d60db66f399351202664cc3d53be8871b49253bf1b73c88bb34497351e2b973188ff51a285e9341f7e7e760fbe54e1ab3610ec1b377ba0e1e4a5dac0e39d355327c159fce240f70daf03b333b87e2f2ac5c3704ef42c0425053c52497d415f24464f62417d6d319f20fcd5d2dd35d0ba1ab0b76e51e42de3e1e798db47d27b0dfaa87d3b493a2ef58b52414420f3284fcfc290077515377fa1785e9b204440013ac99a25493c0877b2cfe0a87a82e9198af3756509bcc7e16e4e2e4c65d24406ecd4b56", @ANYBLOB="ec57f1037fd9d08c7da7b41412dece19f7ad67a91e85679588841b774646aec573b35cef1f44813cd559df7452a6586e807cb1de17a3a97cbeb840178b2168d0c8ed13402e94860d4dcdb675a18aa6e2c40d607cf733cc5639188b525d7690e916f0a6aa80cda80d27b545152c8027d578f61c8b7980b240e357a8b07a98b97af6a440ae4ad8987a0b33e879667e95c1"], 0x6}, 0x1, 0x0, 0x0, 0x4004001}, 0x800) [ 150.252819] device team0 left promiscuous mode [ 150.263415] device team_slave_0 left promiscuous mode [ 150.281715] device team_slave_1 left promiscuous mode 11:16:40 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000580)=[{&(0x7f0000000080)='f', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) getsockopt$inet_int(r0, 0x10d, 0x0, 0x0, &(0x7f0000000000)=0xffffffffffffff95) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000000c0)) [ 150.379001] device team0 entered promiscuous mode [ 151.730468] sched: RT throttling activated [ 151.755679] device team_slave_0 entered promiscuous mode [ 152.731992] audit: type=1400 audit(1580383002.138:64): avc: denied { map } for pid=8517 comm="syz-executor.3" path="socket:[31743]" dev="sockfs" ino=31743 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dccp_socket permissive=1 [ 153.741411] device team_slave_1 entered promiscuous mode [ 153.822352] device team0 left promiscuous mode [ 153.830764] device team_slave_0 left promiscuous mode [ 153.837516] device team_slave_1 left promiscuous mode 11:16:44 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101801, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000080)=0x6, 0x4) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x100a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f00000002c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x7}, r2, 0x9, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000100)='net/rt_cache\x00') mkdir(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f00000003c0)=r3) open(0x0, 0x0, 0x11) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r6 = dup(r5) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) setpgid(r2, r7) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x4c81, 0xfffffffffffffffe) write$P9_RREAD(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x105) socket$key(0xf, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000001ec0)={'batadv_slave_1\x00'}) 11:16:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'geneve0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x34}}, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2000, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x14, r7, 0xf2b}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r7, 0x100, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4008044}, 0x400c8c0) sendmsg$NL80211_CMD_STOP_AP(r6, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000700)={0x590, r7, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x2}, @NL80211_ATTR_TWT_RESPONDER={0x4}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x89}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x1c, 0x49, [0xfac0d, 0xfac02, 0xfac0c, 0xfac00, 0x147201, 0xfac0c]}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x5}, @NL80211_ATTR_BEACON_HEAD={0x539, 0xe, "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"}]}, 0x590}, 0x1, 0x0, 0x0, 0x4008000}, 0x4010) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r5}, 0x3c) r9 = socket$kcm(0x29, 0x5, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8b04, &(0x7f0000000000)='wlan1\x00') 11:16:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x3ff, 0x1, 0x80000000, 0xae479d7}, 0x14) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') 11:16:44 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x24040, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x308) 11:16:44 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x3}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x8, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 11:16:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SOUND_MIXER_READ_VOLUME(r1, 0x80044d03, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000080)={[{@fat=@discard='discard'}]}) 11:16:44 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6}, 0x10) getsockopt$packet_int(r3, 0x107, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="4600000000000400000000000000000000000000000000000038000000000000000000000000002000000000000000000000000000000000000000000000000000c1fb00"/85], 0x58) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/ocfs2_control\x00', 0x10000, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001840)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r4, &(0x7f0000001900)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x1c, r5, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) 11:16:44 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) chmod(&(0x7f0000000100)='./file0\x00', 0x45) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x101000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x599201, 0x0) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000000)) dup3(r0, r1, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) [ 153.992339] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 154.014251] bridge1: port 1(geneve0) entered blocking state [ 154.028401] bridge1: port 1(geneve0) entered disabled state [ 154.036935] device geneve0 entered promiscuous mode 11:16:44 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101801, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000080)=0x6, 0x4) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x100a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f00000002c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x7}, r2, 0x9, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000100)='net/rt_cache\x00') mkdir(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f00000003c0)=r3) open(0x0, 0x0, 0x11) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r6 = dup(r5) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) setpgid(r2, r7) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x4c81, 0xfffffffffffffffe) write$P9_RREAD(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="05010000750100fa000000d21d2dce63b79b59cd8b354620787dc9d1d9a3e8bb83281fb84bce5b26cc2ad8d7aeb305e70d13a2f8f5e05105b5b56403ec4919802fcc12af991a46667a7bbe2f57a84b61edf6cfd23fcf6a4a77b7d3a07de126792a5bf7b3469ec1e784a7938607d8524abf748966d2ee34aeba72be1a143e7a3b4615baa1d65700776dddedf3de1c0ef31a9fbde282ba7c201d645e7f23d18cc90d6236c36c6412551381f5ae4c465e678db9b1cb3943b79c4b1503dfec6465030028a0bde81a94b17eddd1bcfbab530c3d3be7270feeb0495af40fad097af9dc2daacfc9516b5f686fb69180e48dd5071a9a02ef0b9243f709e3ab8aa9cba19f987e9a46cf"], 0x105) socket$key(0xf, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000001ec0)={'batadv_slave_1\x00'}) 11:16:45 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 154.792218] input: syz1 as /devices/virtual/input/input7 [ 154.828354] FAT-fs (loop3): mounting with "discard" option, but the device does not support discard 11:16:45 executing program 4: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 154.860593] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 154.918226] device geneve0 left promiscuous mode [ 154.923669] bridge1: port 1(geneve0) entered disabled state [ 154.933776] SELinux: policydb magic number 0x46 does not match expected magic number 0xf97cff8c 11:16:45 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000280)=""/67) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)="580000001500add427323b472545a45602117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710d2d82817a90d626c65280003ffffffffffffffffffffffe7ee000000", 0x58}], 0x1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000140)={0x42}, 0x10) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00000012000100000000000000000000000000000000000000000000000000000000000200000014000d00f8afe2d4f539fa4a998c2d404700"/73], 0x3c}, 0x8}, 0x0) 11:16:45 executing program 3: r0 = open(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r1, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x400, 0x48e180) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x101000, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r3, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r4, 0x0) fchdir(r4) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000040)='\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000180)="800000003804000019000300e60100f96b000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef51144273fa0c0700bbc9e41f98ccf29f12653b6b06c2984f7d356e32cec0bd10f1ba7119ed644c2762722d31", 0x66, 0x20000006}], 0x115cca3, 0x0) 11:16:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'geneve0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x34}}, 0x0) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2000, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x14, r7, 0xf2b}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r7, 0x100, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4008044}, 0x400c8c0) sendmsg$NL80211_CMD_STOP_AP(r6, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000700)={0x590, r7, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x2}, @NL80211_ATTR_TWT_RESPONDER={0x4}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x89}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x1c, 0x49, [0xfac0d, 0xfac02, 0xfac0c, 0xfac00, 0x147201, 0xfac0c]}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x5}, @NL80211_ATTR_BEACON_HEAD={0x539, 0xe, "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"}]}, 0x590}, 0x1, 0x0, 0x0, 0x4008000}, 0x4010) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r5}, 0x3c) r9 = socket$kcm(0x29, 0x5, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8b04, &(0x7f0000000000)='wlan1\x00') [ 154.971932] SELinux: failed to load policy [ 155.005531] SELinux: policydb magic number 0x46 does not match expected magic number 0xf97cff8c [ 155.011851] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 155.177678] SELinux: failed to load policy 11:16:45 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x3, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac6188d1c739d953059bcecc7a95425a3a07e758054ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xffffffffffffffeb, 0x200003e8, 0x0, 0x27) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) recvmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000001300)=""/4086, 0xff6}, {&(0x7f00000000c0)=""/208, 0xd0}, {&(0x7f0000000000)=""/17, 0x11}, {&(0x7f0000000440)=""/58, 0x3a}, {&(0x7f0000000200)=""/234, 0xea}, {&(0x7f0000000300)=""/133, 0x85}], 0x6, &(0x7f0000000540)=""/117, 0x75}, 0x40010100) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') bind(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) r4 = syz_open_dev$swradio(&(0x7f0000000540)='/dev/swradio#\x00', 0x1, 0x2) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x34, r2, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x34}, 0x1, 0x0, 0x0, 0x90}, 0xc001) ioctl$VIDIOC_S_FREQUENCY(r4, 0x402c5639, &(0x7f0000000580)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r5, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)=0x0) fcntl$setown(r5, 0x8, r6) fgetxattr(r3, 0x0, 0x0, 0x0) 11:16:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x80}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$mouse(0x0, 0x7f, 0x801) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000400)={{0x6c, @broadcast, 0x0, 0x4, 'lblc\x00', 0x2, 0x9, 0x43}, {@multicast1, 0x4e24, 0x1, 0x4, 0x6, 0x3}}, 0x44) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000180)=[0x0], 0x0, 0x1000) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f00000004c0), 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ab64}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8020003) [ 155.959232] bridge3: port 1(geneve0) entered blocking state 11:16:46 executing program 4: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:46 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:46 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0xc7) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x26, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r5 = open(0x0, 0x141042, 0x0) dup(0xffffffffffffffff) fdatasync(r4) socket(0x10, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x6, 0x0, 0x0}], 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x9}) [ 156.163889] bridge3: port 1(geneve0) entered disabled state 11:16:46 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 156.259408] audit: type=1804 audit(1580383006.628:65): pid=8650 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir687532776/syzkaller.eABzyA/30/bus" dev="sda1" ino=16659 res=1 [ 156.278212] device geneve0 entered promiscuous mode 11:16:47 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 157.418545] audit: type=1804 audit(1580383006.728:66): pid=8650 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir687532776/syzkaller.eABzyA/30/bus" dev="sda1" ino=16659 res=1 [ 157.445801] audit: type=1804 audit(1580383007.748:67): pid=8659 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir687532776/syzkaller.eABzyA/30/bus" dev="sda1" ino=16659 res=1 11:16:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="2400ea5764b8baba00000104050000000000000000000000000008000540000000000500"], 0x24}}, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(0xffffffffffffffff, 0xc02064a5, &(0x7f00000000c0)={0x10000, 0x8, &(0x7f0000000000)=[0x6, 0x2, 0x20, 0x7f8, 0x6c7, 0x3, 0x2, 0x7ff], &(0x7f0000000040)=[0x1000, 0x1, 0x8, 0x8001, 0x81, 0x8, 0x3ff], &(0x7f0000000080)=[0x6, 0x401, 0x1ff, 0x3]}) 11:16:48 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 157.673510] audit: type=1804 audit(1580383007.748:68): pid=8668 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir687532776/syzkaller.eABzyA/30/bus" dev="sda1" ino=16659 res=1 11:16:48 executing program 4: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:48 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0], 0x1}) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0xfffffec6) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x3) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup(r4) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ca, 0x2, 0x0, 0xfffffffffffffffe]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 11:16:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(r1) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000040)={0x6, 0x3, 0x4, 0x8, 0xff, {r2, r3/1000+10000}, {0x5, 0x0, 0x8, 0x0, 0x3, 0x0, "18501b01"}, 0x80000000, 0x3, @userptr=0x800, 0x9, 0x0, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) r5 = open(0x0, 0x0, 0x0) fchdir(r5) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000100)) r6 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000a40)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000a80500002004000070030000900100001005000070030000100500001005000010050000100500001005000006000000000000000000000000000000ac14140000000000000000006970766c616e3000000000000000000062617461647630000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c00000000000000000000000000000000000001b6554720f50f9ba8c000000280074746c0000000000000000000000000000000000000000000000000000000000000000000000280054544c00000000000000000000000000000000000000000000000000000001c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000d000000000000000000000000000000000000000000030006168000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030005450524f58590000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b800e00100000000000000000000000000000000000000002000736f636b65740000000000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000000000073797374656d5f753a6f626a6563745f723a7379736c6f67645f696e697472635f657865635f743a733000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000b000000000000000000000000000000000000000000040005450524f58590000000000000000000000000000000000000000000000010000000000000000ac141400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f00000000000000000000000000000000000000000002800727066696c746572000000000000000000000000000000000000000000000000000000000000300061680000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280054544c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x608) 11:16:48 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0x1e40000, 0x2, 0x7, r0, 0x0, &(0x7f0000000040)={0x9a0904, 0x0, [], @ptr=0x8}}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r3, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r7 = open(0x0, 0x0, 0x0) fchdir(r7) r8 = openat$cgroup_ro(r7, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r8, 0x0, 0x485, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r6}, 0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000100)={r6, @in={{0x2, 0x4e22, @empty}}}, 0x84) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl(r9, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") [ 157.702102] audit: type=1804 audit(1580383007.758:69): pid=8650 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir687532776/syzkaller.eABzyA/30/bus" dev="sda1" ino=16659 res=1 11:16:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000340)={'team0\x00'}) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000080)={'veth0_to_team\x00'}) syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x401, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6f726c6f762c6d61785f64b68be369d8aeab27617a2016b9a569725f73697a655f6b623262eb0956cfbc530471f0de00023d3078303030303030303030303030303030302c6a6f75726e616c5f696f7072696f3d3078303030303030311730303030303030302c00"]) r3 = open(0x0, 0x0, 0x0) fchdir(r3) setsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f00000000c0)=0x1, 0x4) 11:16:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000100)) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = socket(0xa, 0x5, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x9, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r1}, @IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x40}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x72439a6b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) [ 157.765427] audit: type=1326 audit(1580383008.138:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8692 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 157.827035] audit: type=1326 audit(1580383008.168:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8692 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 157.852987] audit: type=1326 audit(1580383008.168:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8692 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 11:16:48 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 158.474584] audit: type=1326 audit(1580383008.168:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8692 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 158.499813] audit: type=1326 audit(1580383008.168:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8692 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x45b349 code=0x7ffc0000 [ 158.525470] audit: type=1326 audit(1580383008.168:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8692 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 11:16:49 executing program 4: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 158.665857] device batadv0 entered promiscuous mode 11:16:49 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 158.730531] lo: Cannot use loopback or non-ethernet device as HSR slave. [ 158.738202] audit: type=1326 audit(1580383008.168:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8692 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 158.775071] audit: type=1326 audit(1580383008.168:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8692 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 158.799675] device batadv0 left promiscuous mode [ 158.805644] audit: type=1326 audit(1580383008.168:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8692 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 11:16:49 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:49 executing program 4: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 158.964728] device batadv0 entered promiscuous mode [ 158.972924] audit: type=1326 audit(1580383008.168:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8692 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x45b349 code=0x7ffc0000 [ 159.030594] lo: Cannot use loopback or non-ethernet device as HSR slave. [ 159.071081] device batadv0 left promiscuous mode 11:16:49 executing program 4: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:49 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000100)) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = socket(0xa, 0x5, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x9, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r1}, @IFLA_HSR_SLAVE2={0x8, 0x2, r3}]}}}]}, 0x40}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x72439a6b) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x1) 11:16:49 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) [ 159.735986] device batadv0 entered promiscuous mode 11:16:50 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 159.793295] lo: Cannot use loopback or non-ethernet device as HSR slave. [ 159.850361] device batadv0 left promiscuous mode 11:16:50 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="7000000000011905030000000040000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000500080001"], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r4) close(r4) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={r5, 0x0}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000500)={r5, 0x10}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r5, &(0x7f00000000c0)=""/85}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 11:16:50 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:50 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:50 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') write$selinux_user(r0, &(0x7f0000000000)={'system_u:object_r:iptables_exec_t:s0', 0x20, 'unconfined_u\x00'}, 0x9) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x10400, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x4, 0x1, 0x201, 0x0, 0x0, {0x7, 0x0, 0x7}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) [ 160.154851] SELinux: Context system_u: is not valid (left unmapped). [ 160.194910] bond0: Releasing backup interface bond_slave_0 11:16:50 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0}}) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x3f, 0x4) 11:16:50 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:50 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) dup2(0xffffffffffffffff, r6) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:50 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') r1 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000280)={0x2, 0x10001, 0x200, 0x800, r0}) r3 = memfd_create(&(0x7f0000000180)='\xb3', 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000340)={'team0\x00'}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0101000000000000000001000000440001000c00070000000000000000000c0006006c626c637200000008000b0073e9700008000800000000000800090000000000080001000a0000000800050002000000"], 0x58}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x18, r6, 0x200, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x4000000) write$FUSE_DIRENT(r3, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r3, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 160.478574] IPVS: persistence engine module ip_vs_pe_sép not found 11:16:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0xe, 0x4, 0x0, 0x100000009}, 0x1f) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40200, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000040)={0x0, 0x0, {0xff, 0x7, 0x201a, 0x1, 0xc, 0x1, 0x0, 0x3}}) 11:16:51 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:51 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:16:51 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) dup2(0xffffffffffffffff, r6) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:51 executing program 4: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) dup2(0xffffffffffffffff, r6) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:51 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:51 executing program 4: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) dup2(0xffffffffffffffff, r6) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:52 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r1, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = shmget(0x0, 0x1000, 0x812, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000140)=""/209) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg$inet6(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0xb}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000100)="18", 0x1}], 0x1}}, {{&(0x7f0000000700)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f0000000b80)=[{&(0x7f0000000740)='%', 0x1}], 0x1}}], 0x2, 0x0) 11:16:52 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) dup2(0xffffffffffffffff, r6) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:52 executing program 4: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) dup2(0xffffffffffffffff, r6) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:52 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:53 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:16:53 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:53 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) dup2(0xffffffffffffffff, r6) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:54 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:16:56 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) dup2(0xffffffffffffffff, r6) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:56 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:56 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:56 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000210007041dfffd946f610500020000e8fe0208010001080008000a000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 165.903121] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 11:16:56 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:57 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) dup2(0xffffffffffffffff, r6) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:16:57 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:57 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:16:57 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x4, 0x0, 0x0, 0x0) gettid() timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) tkill(0x0, 0x20000000014) futex(0x0, 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x141, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f00000002c0)={0x980000, 0xfffffc00, 0x1, r0, 0x0, &(0x7f00000000c0)={0x98091d, 0x3, [], @value=0xc2a5}}) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000340)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) rt_sigpending(&(0x7f00000004c0), 0x8) getpid() socket$nl_route(0x10, 0x3, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, &(0x7f0000000140)=',e%\xd7\xe4\x9c\xe3\xc1\x99\x8e/}iR\xd5\v@Z\xe1\xd8\xe8\v\xe6\x87\x93\xd2a6Z\xd3AO%\xda\xdb\xfb$\x0f\xb9\x1fQw.HOo`\xca_\xca\xff\xfe\x85\x1c\xeb$\xbb\x0f\xa5Z@]\xadt;\xf3\x95\x89(|\x9e\xb8C\x896\xdb\x89\r\xe0})D\xee\x7f\x92\xf2\x82\xe3C?\">\x85FRG\x87\xa4f1\xc8l\xfa1\xf9\xcc\x13\xce\x88\xd7\x10\x87~\xa5\xff\x1b@\xefqH\x80\xf0m\x19\xec\x12\x10\xe6\x163\a4I\x94h!(\x19.\xbc\xadx\a\x83\xb4\x98\xe3\x9d\x9f\x1e}\'\xcc\xf5s\x82\v\xa8\xb2\xc4\xf5$\x18O,3\xec@\x8eW5\xef\xfe>\xd9=#\x11\xc1rys\x81\x80\x9b\xfd\xbc\xad\x17A\xae\xfd\x11\x1d\x9b\xf7\xbb\xd1r\xbbq\xb0\xdf\x1e\xc7\xdb\xc1\x89\xec\x12A\xce\xd4\xc5\xd6[\xea!\\\n.\xc4H\xc4\xe1\xf6\x01>\x01\xaa]\xfb\x8c\x05\x99\x9ah\xf8\xdd (\xe5\x86-N\xb3Dp\x1f`/\xc9\xe2\rE>\xc9I\\\x10\x91\x1f\x80\xde\xd7\xd2\xce\xdf@\xdb)Ub\x9dHe\x8c\x1d\x01\x00\x00\x80a`\x9b\xa5\xf8\xf1B\xacT,)\xc2\xa4\xa9\xe8\x92H\x88\xff\a\x00\x00\x00\x00\x00\x00\xc6\xbf\xe7`6\xce$\xda6\xf0\x15\x7f\xfe\xb9\x90\xc3\x1d\xf9\x1d\xfbZ\xec\b\xf1\xd3\xed\xb7\xc1J-\x00\x00\x00\x00\x00\x00\x00') 11:16:58 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 167.811827] device geneve0 left promiscuous mode [ 167.817588] bridge3: port 1(geneve0) entered disabled state [ 167.876245] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 167.900303] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 167.969453] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 167.986519] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 168.055713] tmpfs: Bad mount option e%×äœãÁ™Ž/}iRÕ @ZáØè 懓Òa6ZÓAO%ÚÛû$¹Qw.HOo`Ê_Êÿþ…ë$»¥Z@]­t;ó•‰(|ž¸C‰6Û‰ à})Dî’ò‚ãC?">…FRG‡¤f1Èlú1ùÌΈ×‡~¥ÿ@ïqH€ðmìæ34I”h!(.¼­xƒ´˜ãŸ}'Ìõs‚ ¨²Äõ$O,3ì@ŽW5ïþ>Ù [ 168.061879] device bridge_slave_1 left promiscuous mode [ 168.114930] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.170923] device bridge_slave_0 left promiscuous mode [ 168.176465] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.237769] device veth1_macvtap left promiscuous mode [ 168.253590] device veth0_macvtap left promiscuous mode [ 168.269166] device veth1_vlan left promiscuous mode [ 168.278718] device veth0_vlan left promiscuous mode [ 168.642798] device hsr_slave_1 left promiscuous mode [ 168.686468] device hsr_slave_0 left promiscuous mode [ 168.740176] team0 (unregistering): Port device team_slave_1 removed [ 168.749741] team0 (unregistering): Port device team_slave_0 removed [ 168.759238] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 168.843448] bond0 (unregistering): Released all slaves [ 170.600912] IPVS: ftp: loaded support on port[0] = 21 [ 171.487667] chnl_net:caif_netlink_parms(): no params data found [ 171.523761] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.530315] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.537490] device bridge_slave_0 entered promiscuous mode [ 171.545129] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.551661] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.560643] device bridge_slave_1 entered promiscuous mode [ 171.566785] kauditd_printk_skb: 64 callbacks suppressed [ 171.566795] audit: type=1400 audit(1580383021.938:144): avc: denied { map } for pid=8989 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 171.581718] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 171.606006] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 171.624999] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 171.632411] team0: Port device team_slave_0 added [ 171.638108] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 171.645742] team0: Port device team_slave_1 added [ 171.661372] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 171.667724] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.693325] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 171.704385] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 171.710761] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.736311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 171.746960] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 171.754764] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 171.813072] device hsr_slave_0 entered promiscuous mode [ 171.850500] device hsr_slave_1 entered promiscuous mode [ 171.891102] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 171.898344] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 171.957916] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.964793] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.971802] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.978724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.012425] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 172.018795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.027800] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 172.037124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.044619] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.052339] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.063098] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 172.069236] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.078138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.085807] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.092225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.102557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.110595] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.116995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.133870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.141625] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.153297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.166902] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 172.177799] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 172.188236] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 172.194643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.202480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.210223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.222752] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 172.230287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 172.237023] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 172.247993] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.313328] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 172.323550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 172.361756] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 172.369115] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 172.376346] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 172.385879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.394480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.401591] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.410925] device veth0_vlan entered promiscuous mode [ 172.420940] device veth1_vlan entered promiscuous mode [ 172.426943] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 172.436776] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 172.448447] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 172.457937] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 172.465437] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 172.472896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.481354] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 172.489336] device veth0_macvtap entered promiscuous mode [ 172.500498] device veth1_macvtap entered promiscuous mode [ 172.508949] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 172.518738] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 172.527648] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.538272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.547451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.557253] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.566593] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.577441] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.586680] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.596533] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.606070] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 172.615870] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.625933] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 172.633476] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.643784] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.651816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.663643] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.673649] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.682848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.692745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.702077] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.711863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.721044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.730918] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.740400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 172.740405] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.741406] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 172.766451] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 172.774572] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.782971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 173.945003] bond0: Releasing backup interface bond_slave_0 11:17:04 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:04 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:04 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:04 executing program 3: r0 = accept4$rose(0xffffffffffffffff, &(0x7f00000000c0)=@short={0xb, @dev, @default}, &(0x7f0000000180)=0x1c, 0x80000) recvmsg(r0, &(0x7f00000023c0)={&(0x7f00000001c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)=""/59, 0x3b}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/238, 0xee}], 0x3, &(0x7f00000013c0)=""/4096, 0x1000}, 0x2100) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x3c43, 0xa2a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000080)={0x0, 0x10000, 0x9, &(0x7f0000000040)=0x7}) r2 = pkey_alloc(0x0, 0x3) pkey_free(r2) socket$inet6(0xa, 0x1, 0x8010800000000084) r3 = open(0x0, 0x0, 0x0) fchdir(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'geneve0\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x34}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8, 0xa, r9}]}, 0x28}}, 0x0) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000002400)={r9, @multicast1, @local}, 0xc) 11:17:04 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:17:04 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = socket(0x10, 0x803, 0x10) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0xfffffffffffffeb7, &(0x7f0000000080)={0x0}}, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000580)=0x7, 0x4) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x14c, r4, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x5c, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa493}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1aca9b25}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4d0ebd3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xbe06b5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x10c6}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2de9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x413cc9ae}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1f75b229}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7f9521d8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x37c2bda3}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x74, 0xc, 0x0, 0x1, [{0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x66ad882e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2b6e5efc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x46a16985}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x23c1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x41c40b57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1e0af21c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaf93}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4f69}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x416e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7935}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x20c3fd54}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x278c2cf1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7a9d59ce}]}]}]}, 0x14c}}, 0x800) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32, @ANYBLOB="00000000000000001c0012000c00010062726964676500000c0002000800050000000000419c726960266dc9bb0d0d448bee6161e7369d94ef57b4d19be18516558d83c870543d671cef03f1b4e2e95f8b7a4f5ba6493deda5d3aa33e13ee855d4aefe859b6700fc0ceb9d2d6c2e106631ea26a66773722b3f"], 0x3c}}, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 174.231990] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 174.247850] bridge1: port 1(geneve0) entered blocking state [ 174.253906] bridge1: port 1(geneve0) entered disabled state [ 174.261342] device geneve0 entered promiscuous mode [ 174.309700] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9032 comm=syz-executor.3 11:17:04 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:04 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:05 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:05 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x280082, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r1, 0x8004500b, &(0x7f0000000080)=0x7) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0101000000000000000001000000440001000c00070000000000000000000c0006006c626c637200000008000b000000700008000800000000000800090000000000080001000a0000000800050002000000"], 0x58}}, 0x0) 11:17:05 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) [ 174.769432] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9032 comm=syz-executor.3 11:17:05 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:05 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:05 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:05 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x115e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000001000)=ANY=[], 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) mlock2(&(0x7f00003ff000/0x2000)=nil, 0x2000, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/110, 0x6e}, {&(0x7f0000000040)=""/61, 0x42}, {&(0x7f0000000280)=""/162, 0xa2}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/4096, 0x1000}], 0x5}, 0xb02aca0be48d86cb) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r6}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={r6, 0x5}, 0x8) r7 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r7, 0x406, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000800)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e0010000c0000000c0000000000000000000000000000000700100007001000070010000700100007001000003000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="00000000ebffffffffffffff00000000000000000000000089da640d10eb6ecc07507f83590efe7900000000bdc90f921583210f5524084a7f00000000000000"], @ANYBLOB="e0000002000000000000000000000000626f6e6430000000000000000000000076657468310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000000000000000000000000000000000000000002400434f4e4e5345434d41524b000000000000000000000000000000000000000000000000000000ac1414aae00000020000000000000000726f736530000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000b80000000000000000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000736e6d70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x23c) r9 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, 0x0, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x8, 0x1, &(0x7f0000000800)=[{0x0}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='block=0x0000000000000000,dmode=0x00', @ANYBLOB=',', @ANYRESDEC=0x0, @ANYBLOB, @ANYBLOB="2ce5ed79a5e771b194363a431fca75fb7fce46da"]) creat(0x0, 0x0) io_setup(0x8000, 0x0) syz_open_procfs(0x0, 0x0) socket(0x0, 0x0, 0x0) r10 = memfd_create(&(0x7f0000000000), 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400002, 0x0, 0x2011, r10, 0x0) [ 175.702193] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 175.724550] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 175.749390] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 175.762170] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 175.779416] device bridge_slave_1 left promiscuous mode [ 175.791770] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.840874] device bridge_slave_0 left promiscuous mode [ 175.846549] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.903495] device veth1_macvtap left promiscuous mode [ 175.913467] device veth0_macvtap left promiscuous mode [ 175.919184] device veth1_vlan left promiscuous mode [ 175.925171] device veth0_vlan left promiscuous mode [ 176.054845] device hsr_slave_1 left promiscuous mode [ 176.102710] device hsr_slave_0 left promiscuous mode [ 176.149472] team0 (unregistering): Port device team_slave_1 removed [ 176.159882] team0 (unregistering): Port device team_slave_0 removed [ 176.169230] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 176.222351] bond0 (unregistering): Released all slaves 11:17:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:17:07 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:07 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:07 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:07 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x115e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000001000)=ANY=[], 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) mlock2(&(0x7f00003ff000/0x2000)=nil, 0x2000, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/110, 0x6e}, {&(0x7f0000000040)=""/61, 0x42}, {&(0x7f0000000280)=""/162, 0xa2}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/4096, 0x1000}], 0x5}, 0xb02aca0be48d86cb) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="d838ed6e052b6211218092bbe1933bfd"}]}, &(0x7f0000000180)=0x10) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r6}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={r6, 0x5}, 0x8) r7 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r7, 0x406, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000800)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000e0010000c0000000c0000000000000000000000000000000700100007001000070010000700100007001000003000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="00000000ebffffffffffffff00000000000000000000000089da640d10eb6ecc07507f83590efe7900000000bdc90f921583210f5524084a7f00000000000000"], @ANYBLOB="e0000002000000000000000000000000626f6e6430000000000000000000000076657468310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000000000000000000000000000000000000000002400434f4e4e5345434d41524b000000000000000000000000000000000000000000000000000000ac1414aae00000020000000000000000726f736530000000000000000000000076657468305f746f5f62726964676500000000000000000000000000000000000000000000000000000000000000000000000000000000007000b80000000000000000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000736e6d70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x23c) r9 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, 0x0, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x8, 0x1, &(0x7f0000000800)=[{0x0}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='block=0x0000000000000000,dmode=0x00', @ANYBLOB=',', @ANYRESDEC=0x0, @ANYBLOB, @ANYBLOB="2ce5ed79a5e771b194363a431fca75fb7fce46da"]) creat(0x0, 0x0) io_setup(0x8000, 0x0) syz_open_procfs(0x0, 0x0) socket(0x0, 0x0, 0x0) r10 = memfd_create(&(0x7f0000000000), 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400002, 0x0, 0x2011, r10, 0x0) 11:17:08 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:08 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 178.451555] IPVS: ftp: loaded support on port[0] = 21 [ 179.236054] chnl_net:caif_netlink_parms(): no params data found [ 179.273490] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.280362] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.287241] device bridge_slave_0 entered promiscuous mode [ 179.294188] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.300902] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.307787] device bridge_slave_1 entered promiscuous mode [ 179.325257] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 179.334253] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 179.351755] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.358865] team0: Port device team_slave_0 added [ 179.364719] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.372156] team0: Port device team_slave_1 added [ 179.387981] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 179.394684] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 179.420115] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 179.431152] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 179.437438] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 179.463974] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 179.475031] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 179.483050] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 179.532134] device hsr_slave_0 entered promiscuous mode [ 179.570480] device hsr_slave_1 entered promiscuous mode [ 179.630813] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 179.637933] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 179.698437] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.704848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.711539] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.717898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.748140] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 179.754840] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.763606] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 179.774072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.781862] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.788521] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.798086] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 179.804369] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.814301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.822153] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.828587] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.842198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.849779] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.856465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.869629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.877564] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.887350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.901773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.909164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.920680] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 179.926774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 179.941528] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 179.948988] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 179.956023] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 179.966836] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.028319] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 180.039753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 180.071809] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 180.078888] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 180.085950] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 180.095307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.102977] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.109938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.118364] device veth0_vlan entered promiscuous mode [ 180.129268] device veth1_vlan entered promiscuous mode [ 180.135187] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 180.144779] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 180.158771] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 180.168443] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 180.175907] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 180.183312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 180.193791] device veth0_macvtap entered promiscuous mode [ 180.199821] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 180.208937] device veth1_macvtap entered promiscuous mode [ 180.217670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 180.226990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 180.238333] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 180.251936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.261412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 180.271326] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.280530] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 180.290791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.299934] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 180.309884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.320190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 180.329905] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.341329] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 180.349778] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 180.357197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 180.365170] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 180.374270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 180.384467] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.394374] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 180.404185] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.413331] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 180.423123] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.432262] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 180.442067] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.451212] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 180.461019] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.471842] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 180.478755] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 180.487353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 180.495759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 181.524122] bond0: Releasing backup interface bond_slave_0 11:17:12 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0xffffffffffffffda, 0x4, 0x8, 0x0, 0x0, 0x0, 0x1, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x1e}, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000340)={'team0\x00'}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r4, 0x8983, &(0x7f0000000180)={0x7, 'veth0_to_hsr\x00', {0x3}, 0x2}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000000)={0x1, 0x9, 0x4, 0x400000, 0x6f, {0x0, 0x7530}, {0x4, 0xc, 0xff, 0x8f, 0x9, 0x7, "d047fe08"}, 0x4, 0x2, @fd=r2, 0x0, 0x0, r3}) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e22, 0x24b8, @rand_addr="2f997e3e14ecdfeae775cd093bbb150d", 0xb270}}, 0x0, 0x0, 0x5, 0x0, "f7d7bf92753d858a66e6f117a47b80abf1be394b8acf67033d51d4db5665549098f52d590dade998925e9ecedce63cb6ed0bb87b2078e2b961517420529792e985db5691f1fa730000d4c75514f5ebb5"}, 0xd8) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000000c0)={r7, 0x1, 0x6}, 0x10) r9 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r9, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r9, r9, &(0x7f0000000240), 0x7fff) getsockopt$inet_pktinfo(r9, 0x0, 0x8, &(0x7f00000001c0)={0x0, @dev, @local}, &(0x7f0000000200)=0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f0000000280)={'batadv_slave_0\x00', r10}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x2, 0x3, 0x260, 0x0, 0x0, 0x108, 0x0, 0x0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@rand_addr, @dev, 0x0, 0x0, '\x00', 'veth0\x00', {}, {}, 0x32}, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x3, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 11:17:12 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:12 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:12 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 181.850477] device team0 entered promiscuous mode [ 181.856119] device team_slave_0 entered promiscuous mode [ 181.862484] device team_slave_1 entered promiscuous mode 11:17:12 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 182.070333] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING 11:17:12 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:12 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:13 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:13 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 182.732533] device team0 left promiscuous mode 11:17:13 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 182.754238] device team_slave_0 left promiscuous mode [ 182.764001] device team_slave_1 left promiscuous mode 11:17:13 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) dup2(0xffffffffffffffff, r6) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 182.949773] device team0 entered promiscuous mode [ 182.959201] device team_slave_0 entered promiscuous mode [ 182.970613] device team_slave_1 entered promiscuous mode [ 182.986860] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 183.018093] device team0 left promiscuous mode [ 183.023351] device team_slave_0 left promiscuous mode [ 183.266892] device team_slave_1 left promiscuous mode 11:17:14 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:14 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(0x0, 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = perf_event_open(&(0x7f000001d000)={0x200000002, 0xffffffffffffffda, 0x4, 0x8, 0x0, 0x0, 0x0, 0x1, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x1e}, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000340)={'team0\x00'}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r4, 0x8983, &(0x7f0000000180)={0x7, 'veth0_to_hsr\x00', {0x3}, 0x2}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000000)={0x1, 0x9, 0x4, 0x400000, 0x6f, {0x0, 0x7530}, {0x4, 0xc, 0xff, 0x8f, 0x9, 0x7, "d047fe08"}, 0x4, 0x2, @fd=r2, 0x0, 0x0, r3}) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e22, 0x24b8, @rand_addr="2f997e3e14ecdfeae775cd093bbb150d", 0xb270}}, 0x0, 0x0, 0x5, 0x0, "f7d7bf92753d858a66e6f117a47b80abf1be394b8acf67033d51d4db5665549098f52d590dade998925e9ecedce63cb6ed0bb87b2078e2b961517420529792e985db5691f1fa730000d4c75514f5ebb5"}, 0xd8) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f00000000c0)={r7, 0x1, 0x6}, 0x10) r9 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r9, &(0x7f0000000340)=ANY=[@ANYRES16], 0x2) sendfile(r9, r9, &(0x7f0000000240), 0x7fff) getsockopt$inet_pktinfo(r9, 0x0, 0x8, &(0x7f00000001c0)={0x0, @dev, @local}, &(0x7f0000000200)=0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f0000000280)={'batadv_slave_0\x00', r10}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x2, 0x3, 0x260, 0x0, 0x0, 0x108, 0x0, 0x0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@rand_addr, @dev, 0x0, 0x0, '\x00', 'veth0\x00', {}, {}, 0x32}, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@inet=@esp={{0x30, 'esp\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x3, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 11:17:14 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) dup2(0xffffffffffffffff, r6) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 184.036956] device team0 entered promiscuous mode [ 184.188531] device team_slave_0 entered promiscuous mode [ 184.219018] device team_slave_1 entered promiscuous mode [ 184.420529] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 184.512523] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 184.525716] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 184.551469] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 184.578998] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 184.591149] device bridge_slave_1 left promiscuous mode [ 184.598915] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.652938] device bridge_slave_0 left promiscuous mode [ 184.659049] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.712497] device veth1_macvtap left promiscuous mode [ 184.718454] device veth0_macvtap left promiscuous mode [ 184.724149] device veth1_vlan left promiscuous mode [ 184.729378] device veth0_vlan left promiscuous mode 11:17:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) wait4(0x0, 0x0, 0x0, 0x0) 11:17:15 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) dup2(0xffffffffffffffff, r6) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:15 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:15 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 185.062211] device hsr_slave_1 left promiscuous mode [ 185.125567] device hsr_slave_0 left promiscuous mode [ 185.176275] team0 (unregistering): Port device team_slave_1 removed [ 185.191260] team0 (unregistering): Port device team_slave_0 removed [ 185.202253] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 185.255897] bond0 (unregistering): Released all slaves [ 185.304708] device team0 left promiscuous mode [ 185.309359] device team_slave_0 left promiscuous mode [ 185.317812] device team_slave_1 left promiscuous mode [ 187.010973] IPVS: ftp: loaded support on port[0] = 21 [ 187.786253] chnl_net:caif_netlink_parms(): no params data found [ 187.822350] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.828904] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.836804] device bridge_slave_0 entered promiscuous mode [ 187.843701] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.850232] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.858415] device bridge_slave_1 entered promiscuous mode [ 187.877553] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 187.887542] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 187.903638] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 187.912329] team0: Port device team_slave_0 added [ 187.919301] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 187.926797] team0: Port device team_slave_1 added [ 187.941928] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 187.948611] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.976326] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 187.987532] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 187.994743] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.020262] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 188.032310] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 188.039934] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 188.103528] device hsr_slave_0 entered promiscuous mode [ 188.140490] device hsr_slave_1 entered promiscuous mode [ 188.190912] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 188.198507] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 188.256391] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.263095] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.270196] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.277561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.309150] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 188.317420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.326278] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.335554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.343527] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.351298] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.361859] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 188.369256] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.377825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.385739] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.395519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.410985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.418617] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.425212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.442345] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.450982] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.459031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.467758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.475479] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.484776] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 188.491565] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.504114] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 188.513175] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 188.520467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 188.531310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.596183] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 188.606635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.632193] NOHZ: local_softirq_pending 08 [ 188.636546] NOHZ: local_softirq_pending 08 [ 188.648273] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 188.655920] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 188.663676] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 188.672931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.681287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.688273] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.697552] device veth0_vlan entered promiscuous mode [ 188.708903] device veth1_vlan entered promiscuous mode [ 188.715064] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 188.723789] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 188.737250] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 188.747594] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 188.755129] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 188.763230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 188.771656] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 188.781038] device veth0_macvtap entered promiscuous mode [ 188.790358] device veth1_macvtap entered promiscuous mode [ 188.798958] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 188.808454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 188.817385] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.827738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.837396] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.847395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.856821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.867633] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.876819] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.886979] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.896206] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 188.906394] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.917795] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 188.925115] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 188.935160] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 188.944946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 188.955642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.966204] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.975987] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 188.986061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 188.996144] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.007018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.016873] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.026887] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.036866] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.047140] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.058411] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 189.065859] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 189.074449] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.082903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 189.947642] bond0: Releasing backup interface bond_slave_0 11:17:20 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:20 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:20 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) wait4(0x0, 0x0, 0x0, 0x0) 11:17:20 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:20 executing program 3: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) wait4(0x0, 0x0, 0x0, 0x0) 11:17:20 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:20 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:20 executing program 3: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:20 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:21 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:21 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:21 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:21 executing program 3: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:21 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:21 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:21 executing program 3: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:17:22 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:22 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:22 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:22 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:22 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) [ 192.363912] bond0: Releasing backup interface bond_slave_0 [ 192.474748] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 192.486586] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 192.507836] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 192.526824] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 192.538191] device bridge_slave_1 left promiscuous mode [ 192.545366] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.591025] device bridge_slave_0 left promiscuous mode [ 192.596584] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.653196] device veth1_macvtap left promiscuous mode [ 192.658640] device veth0_macvtap left promiscuous mode [ 192.664169] device veth1_vlan left promiscuous mode [ 192.669399] device veth0_vlan left promiscuous mode [ 192.781782] device hsr_slave_1 left promiscuous mode [ 192.822964] device hsr_slave_0 left promiscuous mode [ 192.867494] team0 (unregistering): Port device team_slave_1 removed [ 192.877978] team0 (unregistering): Port device team_slave_0 removed [ 192.887250] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 192.973559] bond0 (unregistering): Released all slaves [ 194.760900] IPVS: ftp: loaded support on port[0] = 21 [ 195.641094] chnl_net:caif_netlink_parms(): no params data found [ 195.684735] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.691420] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.698506] device bridge_slave_0 entered promiscuous mode [ 195.708742] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.716021] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.723203] device bridge_slave_1 entered promiscuous mode [ 195.745357] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.755391] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.772186] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.779395] team0: Port device team_slave_0 added [ 195.785108] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 195.792764] team0: Port device team_slave_1 added [ 195.811868] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 195.818343] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.844070] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 195.855901] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 195.862445] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.888159] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 195.898956] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 195.908928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 195.963662] device hsr_slave_0 entered promiscuous mode [ 196.000400] device hsr_slave_1 entered promiscuous mode [ 196.043932] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 196.051408] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 196.117464] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.124263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.131068] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.137478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.171237] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 196.177557] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.190214] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 196.201346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.208804] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.216007] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.224914] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 196.231395] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.240420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.247984] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.254476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.270423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.278231] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.284818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.301705] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.309415] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.317733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.325343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.333325] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.395828] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 196.402439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.415987] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 196.423446] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 196.431333] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 196.442891] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.539970] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 196.567090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 196.644072] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 196.652107] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 196.658864] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 196.665438] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 196.675314] device geneve0 left promiscuous mode [ 196.681793] bridge1: port 1(geneve0) entered disabled state [ 196.712568] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 196.719310] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 196.727647] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 196.734824] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 196.743752] device bridge_slave_1 left promiscuous mode [ 196.749331] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.791041] device bridge_slave_0 left promiscuous mode [ 196.796689] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.852312] device veth1_macvtap left promiscuous mode [ 196.857882] device veth0_macvtap left promiscuous mode [ 196.863433] device veth1_vlan left promiscuous mode [ 196.868870] device veth0_vlan left promiscuous mode [ 197.102454] device hsr_slave_1 left promiscuous mode [ 197.142731] device hsr_slave_0 left promiscuous mode [ 197.188690] team0 (unregistering): Port device team_slave_1 removed [ 197.198411] team0 (unregistering): Port device team_slave_0 removed [ 197.207636] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 197.269463] bond0 (unregistering): Released all slaves [ 197.316326] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 197.323555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 197.332021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.341815] device veth0_vlan entered promiscuous mode [ 197.350945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.357963] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.369699] device veth1_vlan entered promiscuous mode [ 197.375587] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 197.385706] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 197.398891] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 197.408131] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 197.415664] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 197.423213] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 197.430949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 197.438457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 197.449485] device veth0_macvtap entered promiscuous mode [ 197.456017] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 197.465137] device veth1_macvtap entered promiscuous mode [ 197.472251] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 197.481327] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 197.493177] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 197.502705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.512738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.522010] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.532147] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.541400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.551301] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.560464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.571096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.581226] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 197.588577] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 197.598304] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 197.605683] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 197.613049] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 197.621236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 197.680802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.694364] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.704262] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.717928] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.727313] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.741320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.753743] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.765149] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.777894] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 197.786575] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 197.796561] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 197.804767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 199.098982] bond0: Releasing backup interface bond_slave_0 11:17:29 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:29 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:29 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:17:29 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:29 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) 11:17:30 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) 11:17:30 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:30 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:30 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:17:30 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:30 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:30 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:30 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 200.700642] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 200.720815] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 200.750226] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 200.767240] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 200.794120] device bridge_slave_1 left promiscuous mode [ 200.810423] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.870970] device bridge_slave_0 left promiscuous mode [ 200.876554] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.952892] device veth1_macvtap left promiscuous mode [ 200.958779] device veth0_macvtap left promiscuous mode [ 200.983472] device veth1_vlan left promiscuous mode [ 200.988700] device veth0_vlan left promiscuous mode [ 201.251748] device hsr_slave_1 left promiscuous mode [ 201.303630] device hsr_slave_0 left promiscuous mode [ 201.349186] team0 (unregistering): Port device team_slave_1 removed [ 201.358743] team0 (unregistering): Port device team_slave_0 removed [ 201.369453] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 201.408120] bond0 (unregistering): Released all slaves [ 203.161484] IPVS: ftp: loaded support on port[0] = 21 [ 203.951392] IPVS: ftp: loaded support on port[0] = 21 [ 204.018141] chnl_net:caif_netlink_parms(): no params data found [ 204.064485] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.071522] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.078522] device bridge_slave_0 entered promiscuous mode [ 204.085676] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.092499] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.099422] device bridge_slave_1 entered promiscuous mode [ 204.118940] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.130113] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 204.152243] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 204.160497] team0: Port device team_slave_0 added [ 204.187594] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 204.194858] team0: Port device team_slave_1 added [ 204.226628] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 204.232974] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.258895] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 204.273517] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 204.280612] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.306102] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 204.316534] chnl_net:caif_netlink_parms(): no params data found [ 204.326337] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 204.336943] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.394239] device hsr_slave_0 entered promiscuous mode [ 204.420394] device hsr_slave_1 entered promiscuous mode [ 204.465193] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 204.472715] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 204.498635] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.505241] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.512629] device bridge_slave_0 entered promiscuous mode [ 204.526228] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.534494] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.541888] device bridge_slave_1 entered promiscuous mode [ 204.565086] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 204.576662] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 204.601803] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 204.608935] team0: Port device team_slave_0 added [ 204.615393] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 204.622948] team0: Port device team_slave_1 added [ 204.657994] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 204.664329] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.692642] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 204.706105] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 204.712496] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 204.738844] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 204.749719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 204.757600] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 204.813100] device hsr_slave_0 entered promiscuous mode [ 204.840421] device hsr_slave_1 entered promiscuous mode [ 204.880986] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 204.889431] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 204.904360] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.910797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.917502] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.924227] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.998466] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.004873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.012139] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.018836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.037228] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.044648] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.053078] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.060185] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.078150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.089350] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 205.099868] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 205.109657] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 205.117108] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.124573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.132234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.142917] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.151336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.159500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.167620] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.174065] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.183730] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.192735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.201835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.211946] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.218566] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.228968] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.239448] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.253929] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.262772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.275795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.285480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 205.295158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.303276] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.312193] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 205.321003] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 205.328362] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.335663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.344185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.353753] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 205.362328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.370670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.379781] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 205.386901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.394164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.403467] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 205.412868] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 205.423327] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 205.429527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.439984] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 205.447298] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.453951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.461697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.473688] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.482385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.492576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.502686] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.509260] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.519094] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.528340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.538711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.547281] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.554261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.566489] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 205.575743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 205.586443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 205.594859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.603545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.612795] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 205.620794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 205.631108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 205.638053] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.645664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 205.652910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.661078] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.669331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.678993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.687547] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.697522] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 205.705746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.713517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.724081] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.734122] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 205.741624] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.749275] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.761214] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 205.767325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.784506] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 205.793013] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 205.799795] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.807976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 205.819408] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.870572] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 205.886319] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 205.894998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 205.903720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.942018] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 205.952935] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 205.960689] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 205.967474] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 205.976616] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 205.988227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 205.996566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.006538] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 206.013472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.021921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.029662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.037029] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.046307] device veth0_vlan entered promiscuous mode [ 206.062414] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 206.069609] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 206.077559] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 206.087595] device veth1_vlan entered promiscuous mode [ 206.097570] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 206.107080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.117529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.125513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.133053] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.140868] device veth0_vlan entered promiscuous mode [ 206.152235] device veth1_vlan entered promiscuous mode [ 206.158218] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 206.167879] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 206.177883] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 206.189227] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 206.197237] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 206.205378] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 206.212802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.220738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.229407] device veth0_macvtap entered promiscuous mode [ 206.235749] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 206.248783] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 206.257527] device veth1_macvtap entered promiscuous mode [ 206.266566] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 206.275186] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 206.283593] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 206.291200] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.298444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.306294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.315927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 206.326852] device veth0_macvtap entered promiscuous mode [ 206.333050] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 206.342613] device veth1_macvtap entered promiscuous mode [ 206.348890] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 206.357593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 206.369277] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.379680] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.389591] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.399789] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.409132] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.419291] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.428668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.439445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.449640] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 206.456794] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 206.467190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 206.474956] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 206.482761] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.490637] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.498823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.509011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.519928] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.529290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.540665] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.549787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.560061] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.569726] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.579814] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.590817] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 206.599497] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 206.609784] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.618862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.628173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 206.642511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.652742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.662716] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.673558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.683184] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.693288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.702840] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.713408] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.722970] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.733518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.744397] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 206.751643] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 206.764083] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.771999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.782164] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.792668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.802551] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.812580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.821802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.831594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.841359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.851133] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.860304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.870859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.881457] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 206.888606] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 206.901070] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.908865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.989875] bond0: Releasing backup interface bond_slave_0 11:17:37 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:37 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:37 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:37 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:37 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:17:37 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) 11:17:37 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00'}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 11:17:37 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:37 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x10001) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:17:37 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:37 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00'}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 11:17:37 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:38 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:38 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:39 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:39 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:39 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:17:40 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:40 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:40 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, r6) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:40 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 210.152841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 210.205194] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 210.231895] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 210.249665] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 210.270668] device bridge_slave_1 left promiscuous mode [ 210.276499] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.335270] device bridge_slave_0 left promiscuous mode [ 210.348923] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.435903] device veth1_macvtap left promiscuous mode [ 210.453191] device veth0_macvtap left promiscuous mode [ 210.458961] device veth1_vlan left promiscuous mode [ 210.481685] device veth0_vlan left promiscuous mode [ 210.713122] device hsr_slave_1 left promiscuous mode [ 210.764485] device hsr_slave_0 left promiscuous mode [ 210.807751] team0 (unregistering): Port device team_slave_1 removed [ 210.817792] team0 (unregistering): Port device team_slave_0 removed [ 210.827460] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 210.863101] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 210.929822] bond0 (unregistering): Released all slaves [ 212.760922] IPVS: ftp: loaded support on port[0] = 21 [ 213.533754] IPVS: ftp: loaded support on port[0] = 21 [ 213.594073] chnl_net:caif_netlink_parms(): no params data found [ 213.657969] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.665982] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.674765] device bridge_slave_0 entered promiscuous mode [ 213.683445] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.690683] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.699295] device bridge_slave_1 entered promiscuous mode [ 213.736641] chnl_net:caif_netlink_parms(): no params data found [ 213.769712] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.781339] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.809245] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 213.817947] team0: Port device team_slave_0 added [ 213.835773] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 213.843905] team0: Port device team_slave_1 added [ 213.864221] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 213.871701] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.900260] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 213.912849] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 213.920733] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.951739] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.975658] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 213.987439] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.995182] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.002828] device bridge_slave_0 entered promiscuous mode [ 214.009857] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 214.026675] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.033976] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.042527] device bridge_slave_1 entered promiscuous mode [ 214.112225] device hsr_slave_0 entered promiscuous mode [ 214.170386] device hsr_slave_1 entered promiscuous mode [ 214.231163] NOHZ: local_softirq_pending 08 [ 214.247020] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 214.258013] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.266119] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 214.281194] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.312950] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.320400] team0: Port device team_slave_0 added [ 214.328702] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.335982] team0: Port device team_slave_1 added [ 214.361380] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 214.367667] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 214.393073] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 214.404768] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 214.411370] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 214.436795] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 214.454252] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 214.464256] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 214.543817] device hsr_slave_0 entered promiscuous mode [ 214.580476] device hsr_slave_1 entered promiscuous mode [ 214.633237] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 214.643374] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 214.685197] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 214.746536] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 214.774350] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.784632] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 214.795201] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 214.805134] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 214.811929] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.818869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.826280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.837692] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 214.844646] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 214.852839] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 214.859856] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 214.867945] device bridge_slave_1 left promiscuous mode [ 214.873856] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.920764] device bridge_slave_0 left promiscuous mode [ 214.926442] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.972060] device veth1_macvtap left promiscuous mode [ 214.977384] device veth0_macvtap left promiscuous mode [ 214.982848] device veth1_vlan left promiscuous mode [ 214.987920] device veth0_vlan left promiscuous mode [ 215.102228] device hsr_slave_1 left promiscuous mode [ 215.155225] device hsr_slave_0 left promiscuous mode [ 215.207218] team0 (unregistering): Port device team_slave_1 removed [ 215.218859] team0 (unregistering): Port device team_slave_0 removed [ 215.229234] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 215.289097] bond0 (unregistering): Released all slaves [ 215.351525] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.359940] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.368236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.376716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.384707] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.392468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.400353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.409665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 215.420908] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 215.428155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.437408] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.445582] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.452203] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.459405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.469475] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.480818] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 215.488658] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.495195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.504056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.511882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.521626] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 215.535504] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 215.541924] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.548878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.557012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.565435] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.579411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 215.586787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.595973] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.604842] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.614427] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 215.622070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.629864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.638450] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.644849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.652499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.660355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.667970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.678435] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 215.688429] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 215.696292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.704535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.712591] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.718950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.726291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.736779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 215.781465] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 215.788347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.800987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.808754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.823881] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 215.838978] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 215.846620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.857900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.867942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.882848] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 215.896848] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 215.908956] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.916875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.929560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.940626] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 215.955125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 215.963595] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 215.974838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.983262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.995992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.003956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.016410] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.023482] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.038552] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 216.046226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.063874] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.087174] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 216.108793] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 216.119370] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.127911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.144685] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.259346] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 216.283343] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 216.301619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 216.314919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.371370] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 216.388255] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 216.395844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 216.408916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.421551] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 216.428625] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 216.437150] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 216.448329] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 216.460711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 216.468839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.482661] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.489841] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.504114] device veth0_vlan entered promiscuous mode [ 216.528908] device veth1_vlan entered promiscuous mode [ 216.543768] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 216.566210] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 216.581759] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 216.592307] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 216.599888] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 216.607688] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 216.615708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 216.623589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.636350] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 216.643829] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 216.653810] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 216.662390] device veth0_macvtap entered promiscuous mode [ 216.668594] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 216.681794] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 216.690291] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 216.697426] device veth1_macvtap entered promiscuous mode [ 216.705115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 216.714124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.728844] device veth0_vlan entered promiscuous mode [ 216.737230] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 216.745173] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.752523] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.763287] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 216.772831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 216.782966] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.792879] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 216.802843] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.814948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 216.824771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.834287] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 216.844556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.854908] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 216.862227] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 216.872827] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 216.881285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.891162] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 216.901757] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.911175] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 216.922426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.932129] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 216.942148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.951761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 216.962244] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 216.973376] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 216.980814] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 216.988311] device veth1_vlan entered promiscuous mode [ 216.994911] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 217.002468] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 217.009732] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 217.022953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.045031] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 217.059970] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 217.071274] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 217.078987] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 217.087253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.095475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.105855] device veth0_macvtap entered promiscuous mode [ 217.116026] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 217.126388] device veth1_macvtap entered promiscuous mode [ 217.133029] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 217.145037] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 217.155145] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 217.165128] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.175853] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.186341] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.196387] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.205697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.215456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.224624] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.234521] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.243701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 217.253608] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.264389] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 217.272107] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 217.282602] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 217.289888] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 217.297966] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.305961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.333731] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.344215] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.355462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.365406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.375523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.385640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.394848] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.404623] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.413845] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 217.423837] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 217.434485] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 217.441873] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 217.454178] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 217.462437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 11:17:47 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00'}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 11:17:47 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 218.301806] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 218.308649] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 218.316396] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 218.323339] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 218.331087] device bridge_slave_1 left promiscuous mode [ 218.336536] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.392337] device bridge_slave_0 left promiscuous mode [ 218.397907] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.442293] device veth1_macvtap left promiscuous mode [ 218.447615] device veth0_macvtap left promiscuous mode [ 218.452998] device veth1_vlan left promiscuous mode [ 218.458148] device veth0_vlan left promiscuous mode [ 218.612516] device hsr_slave_1 left promiscuous mode [ 218.664198] device hsr_slave_0 left promiscuous mode [ 218.728796] team0 (unregistering): Port device team_slave_1 removed [ 218.738179] team0 (unregistering): Port device team_slave_0 removed [ 218.747395] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 218.793818] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 218.869738] bond0 (unregistering): Released all slaves [ 218.928740] bond0: Releasing backup interface bond_slave_0 11:17:49 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:49 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:49 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, r6) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:49 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:17:49 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 11:17:49 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:49 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:17:49 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, r6) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:49 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:49 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:50 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:50 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:50 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:50 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:50 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:17:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 222.611257] IPVS: ftp: loaded support on port[0] = 21 [ 223.449532] chnl_net:caif_netlink_parms(): no params data found [ 223.493951] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.500430] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.507300] device bridge_slave_0 entered promiscuous mode [ 223.514302] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.521262] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.528185] device bridge_slave_1 entered promiscuous mode [ 223.550787] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.559665] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.578109] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 223.585390] team0: Port device team_slave_0 added [ 223.591232] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.598475] team0: Port device team_slave_1 added [ 223.617644] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 223.623977] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.649331] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 223.661401] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 223.667765] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.693295] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 223.707095] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 223.714571] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.754012] device hsr_slave_0 entered promiscuous mode [ 223.820403] device hsr_slave_1 entered promiscuous mode [ 223.883147] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 223.890760] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 223.953346] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.959909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.966889] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.973312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.008779] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 224.015413] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.023924] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 224.038191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.045729] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.052798] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.064999] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 224.071412] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.083005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.091228] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.097683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.114218] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.122160] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.128514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.142876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.150674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.159799] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.173288] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 224.183392] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 224.194762] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 224.201504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.209093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.216928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 224.226107] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 224.233139] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 224.241003] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 224.247713] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 224.255515] device bridge_slave_1 left promiscuous mode [ 224.261135] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.300776] device bridge_slave_0 left promiscuous mode [ 224.306335] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.362138] device veth1_macvtap left promiscuous mode [ 224.367521] device veth0_macvtap left promiscuous mode [ 224.374388] device veth1_vlan left promiscuous mode [ 224.379488] device veth0_vlan left promiscuous mode [ 224.502541] device hsr_slave_1 left promiscuous mode [ 224.543045] device hsr_slave_0 left promiscuous mode [ 224.587146] team0 (unregistering): Port device team_slave_1 removed [ 224.598443] team0 (unregistering): Port device team_slave_0 removed [ 224.608037] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 224.659284] bond0 (unregistering): Released all slaves [ 224.708367] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 224.716071] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 224.725479] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 224.736999] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.743620] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 224.754395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 224.813951] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 224.823306] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 224.831045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 224.838914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.911591] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 224.918758] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 224.930236] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 224.945093] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 224.952208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 224.964734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.972964] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.980479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.989437] device veth0_vlan entered promiscuous mode [ 225.006372] device veth1_vlan entered promiscuous mode [ 225.016294] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 225.026518] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 225.045864] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 225.060338] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 225.067357] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 225.080179] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 225.088216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 225.100597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 225.111190] device veth0_macvtap entered promiscuous mode [ 225.117245] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 225.159560] device veth1_macvtap entered promiscuous mode [ 225.171065] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 225.186391] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 225.208629] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 225.218509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 225.228908] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.238359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 225.248789] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.257966] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 225.268421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.278545] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 225.288739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.299356] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 225.307374] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 225.317203] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 225.325883] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 225.333292] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 225.341775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 225.351820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 225.362551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.374688] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 225.386549] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.398132] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 225.412833] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.423507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 225.436018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.448066] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 225.457999] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 225.466872] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 225.477593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 226.620950] IPVS: ftp: loaded support on port[0] = 21 11:17:57 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 11:17:57 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 227.359952] chnl_net:caif_netlink_parms(): no params data found [ 227.405065] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.411542] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.418564] device bridge_slave_0 entered promiscuous mode [ 227.425701] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.432530] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.439490] device bridge_slave_1 entered promiscuous mode [ 227.461150] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.470257] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.486814] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.494085] team0: Port device team_slave_0 added [ 227.503563] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 227.511042] team0: Port device team_slave_1 added [ 227.525087] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 227.531796] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.557342] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 227.572080] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 227.578467] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.604142] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 227.614794] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.622349] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.672286] device hsr_slave_0 entered promiscuous mode [ 227.720490] device hsr_slave_1 entered promiscuous mode [ 227.770862] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 227.780737] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 227.842802] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.849222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.855934] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.862346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.898132] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.909692] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 227.916714] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.924323] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.934858] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 227.941436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.948446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.957366] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 227.963796] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.976780] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 227.983984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.992301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.999854] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.007225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.016502] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.024064] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.032111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.039689] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.046217] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.055229] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 228.063154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.073364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.081315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.092049] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 228.098928] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 228.106758] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 228.113797] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 228.121581] device bridge_slave_1 left promiscuous mode [ 228.127072] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.180880] device bridge_slave_0 left promiscuous mode [ 228.186562] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.242019] device veth1_macvtap left promiscuous mode [ 228.247673] device veth0_macvtap left promiscuous mode [ 228.253134] device veth1_vlan left promiscuous mode [ 228.258193] device veth0_vlan left promiscuous mode [ 228.402090] device hsr_slave_1 left promiscuous mode [ 228.443138] device hsr_slave_0 left promiscuous mode [ 228.487608] team0 (unregistering): Port device team_slave_1 removed [ 228.496703] team0 (unregistering): Port device team_slave_0 removed [ 228.506697] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 228.554658] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 228.609338] bond0 (unregistering): Released all slaves [ 228.666293] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.674073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.682412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.692053] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.700369] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.707333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.715595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.725344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 228.734142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.742031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.751998] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 228.760281] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 228.771640] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 228.777771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.784905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.793136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.808498] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 228.816616] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 228.823220] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.829964] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.840840] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.971452] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 228.985576] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 228.993525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.005920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.062390] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 229.069571] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 229.077119] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 229.088592] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 229.095361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.103798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.113585] device veth0_vlan entered promiscuous mode [ 229.122131] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.129731] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.144404] device veth1_vlan entered promiscuous mode [ 229.152675] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 229.163715] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 229.177526] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 229.188870] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 229.196507] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 229.204540] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 229.212303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 229.219966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.230550] device veth0_macvtap entered promiscuous mode [ 229.236810] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 229.247091] device veth1_macvtap entered promiscuous mode [ 229.253559] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 229.263701] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 229.274828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 229.284523] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 229.295472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 229.304973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 229.314819] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 229.324327] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 229.334228] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 229.343855] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 229.353986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 229.366458] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 229.376815] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 229.387747] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 229.401693] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 229.408822] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 229.421026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 229.431222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 229.449171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 229.458799] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 229.472827] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 229.483015] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 229.496099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 229.506085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 229.519341] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 229.533857] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 229.541674] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 229.549084] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 229.561663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.767559] bond0: Releasing backup interface bond_slave_0 11:18:01 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:01 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(0x0, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:01 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 11:18:01 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:01 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 11:18:02 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) 11:18:02 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:02 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:02 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(0x0, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:02 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:02 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:02 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:02 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 232.772130] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 232.794262] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 232.816114] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 232.830428] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 232.852617] device bridge_slave_1 left promiscuous mode [ 232.858648] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.930856] device bridge_slave_0 left promiscuous mode [ 232.936956] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.013033] device veth1_macvtap left promiscuous mode [ 233.019346] device veth0_macvtap left promiscuous mode [ 233.040136] device veth1_vlan left promiscuous mode [ 233.046648] device veth0_vlan left promiscuous mode [ 233.222538] device hsr_slave_1 left promiscuous mode [ 233.263800] device hsr_slave_0 left promiscuous mode [ 233.316657] team0 (unregistering): Port device team_slave_1 removed [ 233.328565] team0 (unregistering): Port device team_slave_0 removed [ 233.343051] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 233.407794] bond0 (unregistering): Released all slaves [ 235.191419] IPVS: ftp: loaded support on port[0] = 21 [ 236.050397] IPVS: ftp: loaded support on port[0] = 21 [ 236.117915] chnl_net:caif_netlink_parms(): no params data found [ 236.208795] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.217829] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.225284] device bridge_slave_0 entered promiscuous mode [ 236.232425] chnl_net:caif_netlink_parms(): no params data found [ 236.244268] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.251988] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.259863] device bridge_slave_1 entered promiscuous mode [ 236.282879] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.294673] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.325838] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 236.333389] team0: Port device team_slave_0 added [ 236.343579] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 236.351407] team0: Port device team_slave_1 added [ 236.357089] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.363736] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.371579] device bridge_slave_0 entered promiscuous mode [ 236.386931] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.393477] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.403056] device bridge_slave_1 entered promiscuous mode [ 236.410000] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 236.416764] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.443645] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 236.460439] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 236.467781] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.496688] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 236.514513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 236.524404] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 236.532801] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.543760] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.571858] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 236.579461] team0: Port device team_slave_0 added [ 236.622149] device hsr_slave_0 entered promiscuous mode [ 236.670522] device hsr_slave_1 entered promiscuous mode [ 236.740680] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 236.747810] team0: Port device team_slave_1 added [ 236.760227] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 236.774613] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 236.782065] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 236.788635] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.814766] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 236.832824] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 236.839475] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.868586] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 236.881340] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 236.889347] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 236.952203] device hsr_slave_0 entered promiscuous mode [ 237.000519] device hsr_slave_1 entered promiscuous mode [ 237.053222] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 237.064639] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 237.163015] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 237.183210] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 237.229483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.239346] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 237.248456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.260523] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 237.270855] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 237.279066] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 237.287940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.300866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.308182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.315482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.325958] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 237.332536] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.339943] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 237.347347] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.357602] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 237.366716] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 237.378307] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 237.386297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.396115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.404140] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.411301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.419099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.427654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.435491] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.442492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.449437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.458224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.466650] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.473535] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.483401] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 237.491475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.499395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.506713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.514774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.522865] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.529308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.537690] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 237.549584] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 237.557031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.565809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.575573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 237.586791] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 237.595083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.603974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.614398] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.623576] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.632873] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 237.641620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 237.649017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.657129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.666723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.677301] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 237.688138] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 237.695754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.704464] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.712266] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.720102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.728596] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.739226] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 237.747311] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 237.756735] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 237.765269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.773851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.781547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.789880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.797906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.805668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.815627] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 237.822380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.832520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 237.839995] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.848728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.862979] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 237.869775] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 237.876438] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.888055] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 237.899281] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.906308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.915426] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.929573] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 237.938312] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 237.945414] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.953026] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.968198] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 238.025488] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 238.036459] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 238.044350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 238.053584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.093083] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 238.104038] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 238.112978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 238.122221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.132631] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 238.139892] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 238.147492] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 238.158561] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 238.166246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 238.175437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.184488] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.193208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.203876] device veth0_vlan entered promiscuous mode [ 238.218269] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 238.227150] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 238.235981] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 238.246063] device veth1_vlan entered promiscuous mode [ 238.253333] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 238.262110] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 238.270964] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 238.278618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 238.286741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.296072] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 238.304365] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 238.312853] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.321030] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.330939] device veth0_vlan entered promiscuous mode [ 238.342366] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 238.354294] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 238.362357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 238.371107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.381481] device veth1_vlan entered promiscuous mode [ 238.387937] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 238.398079] device veth0_macvtap entered promiscuous mode [ 238.405060] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 238.415095] device veth1_macvtap entered promiscuous mode [ 238.422703] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 238.430958] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 238.441356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 238.452917] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 238.463467] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 238.473960] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.484549] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 238.494721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.506167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 238.516346] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.525553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 238.535738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.545847] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 238.553972] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 238.565423] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 238.572887] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 238.580824] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 238.588258] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 238.596189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.604214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.616627] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 238.626577] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.636558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 238.647097] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.656924] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 238.667288] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.677118] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 238.687835] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.698344] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 238.705733] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 238.714480] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 238.722757] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.731129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.742906] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 238.753472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 238.761897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.773802] device veth0_macvtap entered promiscuous mode [ 238.780913] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 238.792106] device veth1_macvtap entered promiscuous mode [ 238.799055] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 238.809873] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 238.824225] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 238.834005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 238.844556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.855560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 238.865529] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.875310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 238.885512] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.894944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 238.904989] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.914240] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 238.924570] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 238.935453] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 238.942721] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 238.952441] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 238.964833] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 238.972964] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.982734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.993507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 239.003992] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 239.014120] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 239.024450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 239.035324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 239.045686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 239.056040] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 239.066801] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 239.076492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 239.086744] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 239.096975] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 239.106006] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 239.120754] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 239.129400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 11:18:09 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:09 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 11:18:09 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 240.081886] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 240.088836] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 240.096792] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 240.103705] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 240.111988] device bridge_slave_1 left promiscuous mode [ 240.118709] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.161719] device bridge_slave_0 left promiscuous mode [ 240.167288] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.212289] device veth1_macvtap left promiscuous mode [ 240.217762] device veth0_macvtap left promiscuous mode [ 240.223207] device veth1_vlan left promiscuous mode [ 240.228889] device veth0_vlan left promiscuous mode [ 240.336213] device hsr_slave_1 left promiscuous mode [ 240.393751] device hsr_slave_0 left promiscuous mode [ 240.438442] team0 (unregistering): Port device team_slave_1 removed [ 240.449266] team0 (unregistering): Port device team_slave_0 removed [ 240.458823] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 240.494981] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 240.570838] bond0 (unregistering): Released all slaves 11:18:11 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(0x0, 0xb) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:11 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:11 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:11 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) 11:18:11 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 11:18:11 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:11 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) 11:18:11 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:11 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:11 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:11 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:11 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:12 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:12 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r7 = socket(0x100000000011, 0x2, 0x0) r8 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r8}) bind(r7, 0x0, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:12 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 244.591313] IPVS: ftp: loaded support on port[0] = 21 [ 245.357554] chnl_net:caif_netlink_parms(): no params data found [ 245.399920] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.406644] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.413861] device bridge_slave_0 entered promiscuous mode [ 245.421615] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.428067] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.436444] device bridge_slave_1 entered promiscuous mode [ 245.457127] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 245.466185] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 245.483167] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 245.491023] team0: Port device team_slave_0 added [ 245.499562] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 245.507237] team0: Port device team_slave_1 added [ 245.522728] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 245.528994] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 245.555176] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 245.569616] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 245.576083] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 245.601768] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 245.612338] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 245.619843] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 245.693470] device hsr_slave_0 entered promiscuous mode [ 245.740360] device hsr_slave_1 entered promiscuous mode [ 245.800869] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 245.810939] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 245.868087] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.874503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.881208] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.887591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.926128] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 245.932977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 245.947097] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 245.956188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.964227] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.971116] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.985492] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 245.991647] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.000689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.008394] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.014901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.030357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.037949] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.044356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.052188] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.066272] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 246.074127] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.086872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.096646] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 246.103524] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 246.111315] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 246.118050] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 246.126599] device bridge_slave_1 left promiscuous mode [ 246.132170] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.171012] device bridge_slave_0 left promiscuous mode [ 246.176570] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.233114] device veth1_macvtap left promiscuous mode [ 246.238458] device veth0_macvtap left promiscuous mode [ 246.243838] device veth1_vlan left promiscuous mode [ 246.248938] device veth0_vlan left promiscuous mode [ 246.362892] device hsr_slave_1 left promiscuous mode [ 246.402564] device hsr_slave_0 left promiscuous mode [ 246.446574] team0 (unregistering): Port device team_slave_1 removed [ 246.457541] team0 (unregistering): Port device team_slave_0 removed [ 246.466672] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 246.504977] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 246.558333] bond0 (unregistering): Released all slaves [ 246.606548] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 246.617962] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 246.624291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 246.631709] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 246.638821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.654347] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 246.662819] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 246.669267] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 246.676437] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.687684] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 246.804397] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 246.814931] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 246.823134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.835265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.889567] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 246.902304] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 246.909184] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 246.924115] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 246.934514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.943926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.962880] device veth0_vlan entered promiscuous mode [ 246.975283] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.982850] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.993638] device veth1_vlan entered promiscuous mode [ 246.999652] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 247.014962] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 247.034208] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 247.048836] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 247.056337] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 247.067841] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 247.076234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 247.087966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.098308] device veth0_macvtap entered promiscuous mode [ 247.109122] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 247.124707] device veth1_macvtap entered promiscuous mode [ 247.131361] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 247.146913] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 247.157400] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 247.172771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 247.186397] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.196138] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 247.209852] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.219378] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 247.233350] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.242861] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 247.257057] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.267681] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 247.280367] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 247.289986] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 247.301827] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.309112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 247.321101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.331053] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 247.345607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.355244] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 247.368991] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.379669] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 247.393592] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.404461] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 247.418480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 247.428597] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 247.435890] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 247.443240] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 247.451245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.311319] IPVS: ftp: loaded support on port[0] = 21 11:18:18 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 11:18:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 249.017012] chnl_net:caif_netlink_parms(): no params data found [ 249.065583] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.072149] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.079227] device bridge_slave_0 entered promiscuous mode [ 249.086571] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.093476] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.101271] device bridge_slave_1 entered promiscuous mode [ 249.125178] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.134184] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.155707] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.163430] team0: Port device team_slave_0 added [ 249.169155] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.177573] team0: Port device team_slave_1 added [ 249.193053] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 249.199329] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.225637] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 249.240780] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 249.247048] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.272308] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 249.283111] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.293570] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.352482] device hsr_slave_0 entered promiscuous mode [ 249.390345] device hsr_slave_1 entered promiscuous mode [ 249.440898] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 249.450932] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 249.514421] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.520834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.527401] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.533820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.567967] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.576288] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 249.585971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.593583] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.600843] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.614308] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 249.620763] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.629175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.636990] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.643416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.654880] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 249.662474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.672900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.681047] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.687378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.700483] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 249.709322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 249.716669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.724820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.734766] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 249.742406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.750160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.757922] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 249.767955] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 249.775136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.783443] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.793518] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 249.800450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.807963] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.818280] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 249.825296] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 249.833890] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 249.841040] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 249.848580] device bridge_slave_1 left promiscuous mode [ 249.854354] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.911140] device bridge_slave_0 left promiscuous mode [ 249.916633] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.973343] device veth1_macvtap left promiscuous mode [ 249.978744] device veth0_macvtap left promiscuous mode [ 249.984141] device veth1_vlan left promiscuous mode [ 249.989407] device veth0_vlan left promiscuous mode [ 250.101727] device hsr_slave_1 left promiscuous mode [ 250.142594] device hsr_slave_0 left promiscuous mode [ 250.187085] team0 (unregistering): Port device team_slave_1 removed [ 250.198566] team0 (unregistering): Port device team_slave_0 removed [ 250.207960] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 250.235714] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 250.299327] bond0 (unregistering): Released all slaves [ 250.344744] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 250.352267] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.360841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.370629] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 250.376824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 250.392781] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 250.400980] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 250.407605] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 250.415096] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.425943] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 250.489989] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 250.499552] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 250.507960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 250.516253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.586477] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 250.598065] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 250.605503] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 250.620782] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 250.627405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 250.639900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.649529] device veth0_vlan entered promiscuous mode [ 250.661954] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.669512] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.683992] device veth1_vlan entered promiscuous mode [ 250.706761] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 250.726209] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 250.736619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 250.746035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.759742] device veth0_macvtap entered promiscuous mode [ 250.767445] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 250.779930] device veth1_macvtap entered promiscuous mode [ 250.787828] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 250.802287] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 250.815693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 250.826280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 250.839267] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.849758] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 250.863973] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.873299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 250.886946] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.896167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 250.909729] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 250.924124] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 250.931277] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 250.945742] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 250.953689] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 250.964983] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 250.972987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.987906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 250.998396] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 251.012376] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 251.024005] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 251.036031] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 251.047795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 251.059459] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 251.073568] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 251.084570] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 251.095595] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 251.102904] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 251.116572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 11:18:22 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00'}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 11:18:22 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r4, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r4, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r5 = socket(0x100000000011, 0x2, 0x0) r6 = dup2(0xffffffffffffffff, r4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r6}) bind(r5, 0x0, 0x0) getsockopt$inet6_mreq(r5, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:22 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:22 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:22 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 11:18:23 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:23 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r4, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r4, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r5 = socket(0x100000000011, 0x2, 0x0) r6 = dup2(0xffffffffffffffff, r4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r6}) bind(r5, 0x0, 0x0) getsockopt$inet6_mreq(r5, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:23 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00'}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 11:18:23 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:23 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r4, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r4, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r5 = socket(0x100000000011, 0x2, 0x0) r6 = dup2(0xffffffffffffffff, r4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r6}) bind(r5, 0x0, 0x0) getsockopt$inet6_mreq(r5, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:24 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:24 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:24 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 254.313142] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 254.330829] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 254.338889] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 254.355977] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 254.377922] device bridge_slave_1 left promiscuous mode [ 254.383725] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.450835] device bridge_slave_0 left promiscuous mode [ 254.460798] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.513246] device veth1_macvtap left promiscuous mode [ 254.529786] device veth0_macvtap left promiscuous mode [ 254.535330] device veth1_vlan left promiscuous mode [ 254.550441] device veth0_vlan left promiscuous mode [ 254.705407] device hsr_slave_1 left promiscuous mode [ 254.753832] device hsr_slave_0 left promiscuous mode [ 254.800460] team0 (unregistering): Port device team_slave_1 removed [ 254.809951] team0 (unregistering): Port device team_slave_0 removed [ 254.819329] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 254.863340] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 254.938309] bond0 (unregistering): Released all slaves [ 256.751346] IPVS: ftp: loaded support on port[0] = 21 [ 257.579889] IPVS: ftp: loaded support on port[0] = 21 [ 257.643539] chnl_net:caif_netlink_parms(): no params data found [ 257.698410] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.705072] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.712282] device bridge_slave_0 entered promiscuous mode [ 257.723768] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.730509] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.737539] device bridge_slave_1 entered promiscuous mode [ 257.761338] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 257.790543] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 257.825009] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 257.832448] team0: Port device team_slave_0 added [ 257.837699] chnl_net:caif_netlink_parms(): no params data found [ 257.846126] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 257.853374] team0: Port device team_slave_1 added [ 257.884993] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 257.891819] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.917357] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 257.928728] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 257.935090] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 257.960359] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 257.970954] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 257.983031] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 258.001806] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.008340] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.015406] device bridge_slave_0 entered promiscuous mode [ 258.026444] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.035322] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.042312] device bridge_slave_1 entered promiscuous mode [ 258.082182] device hsr_slave_0 entered promiscuous mode [ 258.130377] device hsr_slave_1 entered promiscuous mode [ 258.185775] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 258.193196] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 258.210696] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 258.220929] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 258.248005] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 258.255242] team0: Port device team_slave_0 added [ 258.261532] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 258.268680] team0: Port device team_slave_1 added [ 258.291058] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 258.297342] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 258.322964] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 258.336387] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 258.343519] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 258.369097] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 258.382389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 258.394626] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 258.452105] device hsr_slave_0 entered promiscuous mode [ 258.490361] device hsr_slave_1 entered promiscuous mode [ 258.544940] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 258.552698] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 258.588504] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.595040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.601721] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.608293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.632365] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.639398] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.686449] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 258.711310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.724433] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.734318] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 258.744024] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 258.750380] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.757357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.764445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.773450] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 258.781594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 258.789443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.797270] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.803662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.816954] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 258.825856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.834289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.841965] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.848409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.862337] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 258.874693] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.881762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 258.890550] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 258.898524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 258.908248] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.917753] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 258.925696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 258.933919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 258.941848] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 258.951000] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 258.958190] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 258.966273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.977269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.984239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 258.992109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.001841] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 259.007939] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.017579] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 259.025177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.037172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.046455] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 259.054432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.062578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.072409] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 259.081884] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 259.087941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.095050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.103044] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.110961] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.117507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.126266] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.135129] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 259.145460] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 259.154184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.162551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.170841] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.177201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.184370] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 259.195393] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 259.203674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 259.214029] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 259.223240] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 259.230718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.237480] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.245261] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 259.253090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 259.261601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.271060] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 259.279950] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 259.291389] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 259.297896] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 259.308240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.317334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.325244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.333059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.343770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 259.351265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.358896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.369385] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 259.375832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.392225] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 259.400648] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 259.406958] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 259.414720] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 259.426347] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 259.446057] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 259.456901] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 259.464843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 259.473069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 259.515233] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 259.522985] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 259.529747] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 259.540847] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 259.547759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 259.556229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.564663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.572110] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.579950] device veth0_vlan entered promiscuous mode [ 259.592163] device veth1_vlan entered promiscuous mode [ 259.598117] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 259.607943] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 259.621356] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 259.632379] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 259.641662] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 259.648852] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 259.658757] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 259.666469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 259.675245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 259.686762] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 259.698018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 259.706673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 259.719598] device veth0_macvtap entered promiscuous mode [ 259.726829] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 259.736556] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 259.744492] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 259.751850] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 259.759518] device veth1_macvtap entered promiscuous mode [ 259.766032] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 259.775826] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 259.786183] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 259.796916] device veth0_vlan entered promiscuous mode [ 259.803723] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 259.813763] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.823730] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.833229] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.843586] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.852784] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.862595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.872538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.882356] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.892389] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 259.899483] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 259.907851] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 259.915654] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 259.922820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 259.930427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.937901] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 259.946264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 259.954559] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.962232] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.971757] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 259.981988] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.991529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.001366] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.010512] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.020310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.029424] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.039254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.049434] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 260.056514] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 260.064718] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 260.073285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 260.090607] device veth1_vlan entered promiscuous mode [ 260.096570] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 260.108628] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 260.122880] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 260.134214] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 260.141573] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 260.149178] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 260.156729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 260.164896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 260.177352] device veth0_macvtap entered promiscuous mode [ 260.183851] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 260.193580] device veth1_macvtap entered promiscuous mode [ 260.199815] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 260.211218] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 260.223238] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 260.234382] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 260.244339] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.253850] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 260.264213] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.273954] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 260.283872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.293452] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 260.303494] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.312874] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 11:18:30 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 11:18:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:30 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) [ 260.322815] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.333227] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 260.340355] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 260.350150] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 260.366860] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 260.381306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 260.389964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 260.400927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.412195] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.421704] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.432192] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.441564] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.451410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.460670] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.470867] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.479984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.489818] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.503933] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 260.511509] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 260.525666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 260.543288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 261.232702] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 261.239597] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 261.247426] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 261.254255] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 261.262170] device bridge_slave_1 left promiscuous mode [ 261.267661] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.302128] device bridge_slave_0 left promiscuous mode [ 261.307676] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.332812] device veth1_macvtap left promiscuous mode [ 261.338225] device veth0_macvtap left promiscuous mode [ 261.343782] device veth1_vlan left promiscuous mode [ 261.348848] device veth0_vlan left promiscuous mode [ 261.473553] device hsr_slave_1 left promiscuous mode [ 261.513316] device hsr_slave_0 left promiscuous mode [ 261.569479] team0 (unregistering): Port device team_slave_1 removed [ 261.579204] team0 (unregistering): Port device team_slave_0 removed [ 261.588621] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 261.624591] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 261.694991] bond0 (unregistering): Released all slaves 11:18:32 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00'}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 11:18:32 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:32 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:32 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:32 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0), 0x1, 0x0, 0x0, 0x34}, 0x84) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 11:18:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:32 executing program 3: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000200)=0xf30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_open_procfs(0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) bind$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) syz_open_dev$vcsa(0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 11:18:32 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:32 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:32 executing program 5: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r1, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 11:18:33 executing program 2: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r6, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r6, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r7 = dup2(0xffffffffffffffff, r6) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:33 executing program 1: sysfs$2(0x2, 0x37, &(0x7f0000000400)=""/85) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x448c40, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{}, "47bba1314d12c3f0", "f3d76c635d0439caf612c51086a20c4508bc1734399efaacbd0116bc3c416cd0", "537a931a", "a45d61b369e9446b"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x204924b51e4d20, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200004c0, 0x200004f0, 0x20000520], 0x0, &(0x7f00000000c0), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000ff0f000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0x108) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x722c36e534dc1f89) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1000001, 0x11, r5, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) dup2(r5, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000001c0)) r6 = socket(0x100000000011, 0x2, 0x0) r7 = dup2(0xffffffffffffffff, r5) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000380)={0x101, 0x7, 0x4, 0x20000000, 0xf4, {0x0, 0x2710}, {0x2, 0x8, 0x9a, 0x9, 0x4, 0x1, "7098988e"}, 0xef4, 0x2, @offset=0x9, 0x7, 0x0, r7}) bind(r6, 0x0, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000100)=0x14) dup(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9c, &(0x7f0000000180), 0x0, 0x0) 11:18:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2d}, 0x0, 0x0, 0x0, 0x8}, 0x20) tkill(r0, 0xb) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 265.770869] IPVS: ftp: loaded support on port[0] = 21 [ 266.585894] chnl_net:caif_netlink_parms(): no params data found [ 266.628304] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.634796] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.642069] device bridge_slave_0 entered promiscuous mode [ 266.648896] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.655389] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.662433] device bridge_slave_1 entered promiscuous mode [ 266.679944] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 266.689015] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 266.707169] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 266.714541] team0: Port device team_slave_0 added [ 266.720409] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 266.727671] team0: Port device team_slave_1 added [ 266.748480] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 266.755047] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.780469] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 266.795335] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 266.801743] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.827074] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 266.837467] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 266.845099] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 266.913384] device hsr_slave_0 entered promiscuous mode [ 266.950430] device hsr_slave_1 entered promiscuous mode [ 266.995145] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 267.002397] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 267.064613] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.071024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.077636] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.084072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.119819] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 267.126384] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.139031] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 267.148026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.155969] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.163095] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.175853] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 267.182045] 8021q: adding VLAN 0 to HW filter on device team0 [ 267.190746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.198449] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.204872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.220767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.228598] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.235043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.243056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.250923] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 267.264106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.274975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.286220] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 267.296701] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 267.303340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 267.310852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.325486] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 267.333088] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 267.339814] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 267.353137] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 267.359883] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 267.367622] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 267.374453] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 267.383484] device bridge_slave_1 left promiscuous mode [ 267.389197] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.440868] device bridge_slave_0 left promiscuous mode [ 267.447107] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.492080] device veth1_macvtap left promiscuous mode [ 267.497402] device veth0_macvtap left promiscuous mode [ 267.502831] device veth1_vlan left promiscuous mode [ 267.507903] device veth0_vlan left promiscuous mode [ 267.632090] device hsr_slave_1 left promiscuous mode [ 267.674202] device hsr_slave_0 left promiscuous mode [ 267.728708] team0 (unregistering): Port device team_slave_1 removed [ 267.738126] team0 (unregistering): Port device team_slave_0 removed [ 267.747408] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 267.785630] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 267.839479] bond0 (unregistering): Released all slaves [ 267.886492] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 267.893515] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 267.958795] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 267.969782] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 267.977629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 267.986161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.025850] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 268.035115] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 268.042714] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 268.049705] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 268.052229] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 268.061371] ------------[ cut here ]------------ [ 268.067935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 268.072544] WARNING: CPU: 0 PID: 7538 at lib/debugobjects.c:287 debug_print_object.cold+0xa7/0xdb [ 268.072548] Kernel panic - not syncing: panic_on_warn set ... [ 268.072548] [ 268.072554] CPU: 0 PID: 7538 Comm: kworker/u4:7 Not tainted 4.14.169-syzkaller #0 [ 268.072558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.072570] Workqueue: netns cleanup_net [ 268.072574] Call Trace: [ 268.072588] dump_stack+0x142/0x197 [ 268.072661] panic+0x1f9/0x42d [ 268.072667] ? add_taint.cold+0x16/0x16 [ 268.072672] ? debug_print_object.cold+0xa7/0xdb [ 268.072679] ? debug_print_object.cold+0xa7/0xdb [ 268.072684] __warn.cold+0x2f/0x2f [ 268.072691] ? ist_end_non_atomic+0x10/0x10 [ 268.072697] ? debug_print_object.cold+0xa7/0xdb [ 268.072703] report_bug+0x216/0x254 [ 268.072711] do_error_trap+0x1bb/0x310 [ 268.072718] ? math_error+0x360/0x360 [ 268.072727] ? vprintk_emit+0x171/0x600 [ 268.072737] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.072746] do_invalid_op+0x1b/0x20 [ 268.072753] invalid_op+0x1b/0x40 [ 268.072760] RIP: 0010:debug_print_object.cold+0xa7/0xdb [ 268.072763] RSP: 0018:ffff88805e7df858 EFLAGS: 00010082 [ 268.072770] RAX: 0000000000000061 RBX: 0000000000000003 RCX: 0000000000000000 [ 268.072775] RDX: 0000000000000000 RSI: ffffffff86cc0a60 RDI: ffffed100bcfbf01 [ 268.072779] RBP: ffff88805e7df880 R08: 0000000000000061 R09: 0000000000000000 [ 268.072783] R10: 0000000000000000 R11: ffff88805e7d02c0 R12: ffffffff86cbbce0 [ 268.072787] R13: ffffffff813d6050 R14: 0000000000000000 R15: ffff8880596c9e40 [ 268.072795] ? work_on_cpu_safe+0x80/0x80 [ 268.072804] ? debug_print_object.cold+0xa7/0xdb [ 268.072812] debug_check_no_obj_freed+0x3f5/0x7b7 [ 268.072821] ? free_obj_work+0x6d0/0x6d0 [ 268.072828] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 268.072837] kfree+0xbd/0x270 [ 268.080452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.088902] ? xps_cpus_show+0x600/0x600 [ 268.102561] device veth0_vlan entered promiscuous mode [ 268.103919] kvfree+0x4d/0x60 [ 268.114404] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.117326] netdev_freemem+0x4c/0x60 [ 268.120572] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.123542] netdev_release+0x72/0x90 [ 268.130453] device veth1_vlan entered promiscuous mode [ 268.130705] device_release+0x163/0x1a0 [ 268.135973] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 268.140210] ? dev_attr_show+0xc0/0xc0 [ 268.140218] kobject_put+0x14e/0x210 [ 268.140226] ? batadv_get_drvinfo+0x140/0x140 [ 268.140235] netdev_run_todo+0x4e4/0x770 [ 268.140242] ? br_dev_open+0x70/0x70 [ 268.140248] ? netdev_info+0xf0/0xf0 [ 268.140254] ? dev_set_mtu+0x400/0x400 [ 268.140263] ? unregister_netdevice_queue+0x196/0x230 [ 268.146893] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 268.148300] rtnl_unlock+0xe/0x10 [ 268.158574] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 268.160642] default_device_exit_batch+0x328/0x3d0 [ 268.160650] ? unregister_netdevice_many+0x50/0x50 [ 268.160657] ? rtnl_unlock+0xe/0x10 [ 268.160666] ? do_wait_intr_irq+0x2a0/0x2a0 [ 268.160672] ? rtnl_unlock+0xe/0x10 [ 268.160681] ? unregister_netdevice_many+0x50/0x50 [ 268.167545] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 268.168487] ? dev_change_net_namespace+0xa10/0xa10 [ 268.173809] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 268.177039] ops_exit_list.isra.0+0xfc/0x150 [ 268.181526] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 268.185955] cleanup_net+0x3ba/0x870 [ 268.185966] ? net_drop_ns+0x80/0x80 [ 268.191908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 268.198612] ? __lock_is_held+0xb6/0x140 [ 268.206578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 268.213164] ? check_preemption_disabled+0x3c/0x250 [ 268.213176] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 268.213185] process_one_work+0x863/0x1600 [ 268.213195] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 268.213203] worker_thread+0x5d9/0x1050 [ 268.213214] kthread+0x319/0x430 [ 268.213220] ? process_one_work+0x1600/0x1600 [ 268.213226] ? kthread_create_on_node+0xd0/0xd0 [ 268.213235] ret_from_fork+0x24/0x30 [ 268.213247] [ 268.213249] ====================================================== [ 268.213251] WARNING: possible circular locking dependency detected [ 268.213253] 4.14.169-syzkaller #0 Not tainted [ 268.213256] ------------------------------------------------------ [ 268.213259] kworker/u4:7/7538 is trying to acquire lock: [ 268.213261] ((console_sem).lock){-.-.}, at: [] down_trylock+0x13/0x70 [ 268.213267] [ 268.213269] but task is already holding lock: [ 268.213270] (&obj_hash[i].lock){-.-.}, at: [] debug_check_no_obj_freed+0x12d/0x7b7 [ 268.213277] [ 268.213280] which lock already depends on the new lock. [ 268.213281] [ 268.213282] [ 268.213285] the existing dependency chain (in reverse order) is: [ 268.213285] [ 268.213286] -> #5 (&obj_hash[i].lock){-.-.}: [ 268.213292] lock_acquire+0x16f/0x430 [ 268.213294] _raw_spin_lock_irqsave+0x95/0xcd [ 268.213296] debug_object_activate+0x10b/0x450 [ 268.213298] enqueue_hrtimer+0x27/0x3b0 [ 268.213300] hrtimer_start_range_ns+0x50a/0x10d0 [ 268.213302] schedule_hrtimeout_range_clock+0x17c/0x340 [ 268.213303] schedule_hrtimeout+0x25/0x30 [ 268.213305] wait_task_inactive+0x4ac/0x580 [ 268.213307] __kthread_bind_mask+0x24/0xc0 [ 268.213309] kthread_bind_mask+0x23/0x30 [ 268.213311] create_worker+0x31b/0x530 [ 268.213313] workqueue_init+0x57b/0x68a [ 268.213315] kernel_init_freeable+0x2af/0x532 [ 268.213316] kernel_init+0x12/0x162 [ 268.213318] ret_from_fork+0x24/0x30 [ 268.213319] [ 268.213320] -> #4 (hrtimer_bases.lock){-.-.}: [ 268.213326] lock_acquire+0x16f/0x430 [ 268.213328] _raw_spin_lock_irqsave+0x95/0xcd [ 268.213330] lock_hrtimer_base.isra.0+0x75/0x130 [ 268.213332] hrtimer_start_range_ns+0x7a/0x10d0 [ 268.213334] enqueue_task_rt+0x972/0xe40 [ 268.213336] __sched_setscheduler.constprop.0+0xc59/0x2340 [ 268.213338] _sched_setscheduler+0x10e/0x180 [ 268.213340] sched_setscheduler+0xe/0x10 [ 268.213342] watchdog_enable+0x10b/0x160 [ 268.213343] smpboot_thread_fn+0x444/0x960 [ 268.213345] kthread+0x319/0x430 [ 268.213347] ret_from_fork+0x24/0x30 [ 268.213348] [ 268.213348] -> #3 (&rt_b->rt_runtime_lock){-.-.}: [ 268.213354] lock_acquire+0x16f/0x430 [ 268.213356] _raw_spin_lock+0x2f/0x40 [ 268.213357] enqueue_task_rt+0x524/0xe40 [ 268.213359] __sched_setscheduler.constprop.0+0xc59/0x2340 [ 268.213361] _sched_setscheduler+0x10e/0x180 [ 268.213363] sched_setscheduler+0xe/0x10 [ 268.213364] watchdog_enable+0x10b/0x160 [ 268.213366] smpboot_thread_fn+0x444/0x960 [ 268.213368] kthread+0x319/0x430 [ 268.213369] ret_from_fork+0x24/0x30 [ 268.213370] [ 268.213371] -> #2 (&rq->lock){-.-.}: [ 268.213376] lock_acquire+0x16f/0x430 [ 268.213378] _raw_spin_lock+0x2f/0x40 [ 268.213380] task_fork_fair+0x63/0x5b0 [ 268.213381] sched_fork+0x3a6/0xc10 [ 268.213384] copy_process.part.0+0x15b7/0x6a70 [ 268.213386] _do_fork+0x19e/0xce0 [ 268.213388] kernel_thread+0x34/0x40 [ 268.213390] rest_init+0x24/0x1e2 [ 268.213392] start_kernel+0x65f/0x67d [ 268.213394] x86_64_start_reservations+0x29/0x2b [ 268.213396] x86_64_start_kernel+0x77/0x7b [ 268.213403] secondary_startup_64+0xa5/0xb0 [ 268.213404] [ 268.213405] -> #1 (&p->pi_lock){-.-.}: [ 268.213411] lock_acquire+0x16f/0x430 [ 268.213412] _raw_spin_lock_irqsave+0x95/0xcd [ 268.213414] try_to_wake_up+0x79/0xf90 [ 268.213416] wake_up_process+0x10/0x20 [ 268.213417] __up.isra.0+0x136/0x1a0 [ 268.213419] up+0x9c/0xe0 [ 268.213421] __up_console_sem+0xad/0x1b0 [ 268.213423] console_unlock+0x59d/0xed0 [ 268.213425] vprintk_emit+0x1f9/0x600 [ 268.213426] vprintk_default+0x28/0x30 [ 268.213428] vprintk_func+0x5d/0x159 [ 268.213430] printk+0x9e/0xbc [ 268.213432] kauditd_hold_skb.cold+0x3e/0x4d [ 268.213434] kauditd_send_queue+0xfe/0x140 [ 268.213436] kauditd_thread+0x644/0x860 [ 268.213438] kthread+0x319/0x430 [ 268.213440] ret_from_fork+0x24/0x30 [ 268.213441] [ 268.213442] -> #0 ((console_sem).lock){-.-.}: [ 268.213449] __lock_acquire+0x2cb3/0x4620 [ 268.213451] lock_acquire+0x16f/0x430 [ 268.213453] _raw_spin_lock_irqsave+0x95/0xcd [ 268.213455] down_trylock+0x13/0x70 [ 268.213457] __down_trylock_console_sem+0x9c/0x200 [ 268.213459] console_trylock+0x17/0x80 [ 268.213461] vprintk_emit+0x1eb/0x600 [ 268.213463] vprintk_default+0x28/0x30 [ 268.213465] vprintk_func+0x5d/0x159 [ 268.213467] printk+0x9e/0xbc [ 268.213469] debug_print_object.cold+0xa7/0xdb [ 268.213472] debug_check_no_obj_freed+0x3f5/0x7b7 [ 268.213473] kfree+0xbd/0x270 [ 268.213475] kvfree+0x4d/0x60 [ 268.213477] netdev_freemem+0x4c/0x60 [ 268.213479] netdev_release+0x72/0x90 [ 268.213481] device_release+0x163/0x1a0 [ 268.213484] kobject_put+0x14e/0x210 [ 268.213486] netdev_run_todo+0x4e4/0x770 [ 268.213488] rtnl_unlock+0xe/0x10 [ 268.213490] default_device_exit_batch+0x328/0x3d0 [ 268.213492] ops_exit_list.isra.0+0xfc/0x150 [ 268.213494] cleanup_net+0x3ba/0x870 [ 268.213496] process_one_work+0x863/0x1600 [ 268.213498] worker_thread+0x5d9/0x1050 [ 268.213500] kthread+0x319/0x430 [ 268.213502] ret_from_fork+0x24/0x30 [ 268.213503] [ 268.213506] other info that might help us debug this: [ 268.213507] [ 268.213508] Chain exists of: [ 268.213510] (console_sem).lock --> hrtimer_bases.lock --> &obj_hash[i].lock [ 268.213518] [ 268.213521] Possible unsafe locking scenario: [ 268.213522] [ 268.213524] CPU0 CPU1 [ 268.213526] ---- ---- [ 268.213527] lock(&obj_hash[i].lock); [ 268.213531] lock(hrtimer_bases.lock); [ 268.213536] lock(&obj_hash[i].lock); [ 268.213540] lock((console_sem).lock); [ 268.213543] [ 268.213545] *** DEADLOCK *** [ 268.213546] [ 268.213548] 4 locks held by kworker/u4:7/7538: [ 268.213549] #0: ("%s""netns"){+.+.}, at: [] process_one_work+0x76e/0x1600 [ 268.213556] #1: (net_cleanup_work){+.+.}, at: [] process_one_work+0x7ab/0x1600 [ 268.213564] #2: (net_mutex){+.+.}, at: [] cleanup_net+0x11c/0x870 [ 268.213571] #3: (&obj_hash[i].lock){-.-.}, at: [] debug_check_no_obj_freed+0x12d/0x7b7 [ 268.213591] [ 268.213592] stack backtrace: [ 268.213596] CPU: 0 PID: 7538 Comm: kworker/u4:7 Not tainted 4.14.169-syzkaller #0 [ 268.213599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.213601] Workqueue: netns cleanup_net [ 268.213604] Call Trace: [ 268.213606] dump_stack+0x142/0x197 [ 268.213608] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 268.213611] __lock_acquire+0x2cb3/0x4620 [ 268.213613] ? add_lock_to_list.isra.0+0x17c/0x330 [ 268.213615] ? trace_hardirqs_on+0x10/0x10 [ 268.213617] ? netdev_bits+0xb0/0xb0 [ 268.213619] ? save_trace+0x290/0x290 [ 268.213621] ? kvm_clock_read+0x23/0x40 [ 268.213623] ? kvm_sched_clock_read+0x9/0x20 [ 268.213625] lock_acquire+0x16f/0x430 [ 268.213627] ? down_trylock+0x13/0x70 [ 268.213628] ? vprintk_emit+0x109/0x600 [ 268.213631] _raw_spin_lock_irqsave+0x95/0xcd [ 268.213632] ? down_trylock+0x13/0x70 [ 268.213634] ? vprintk_emit+0x1eb/0x600 [ 268.213636] down_trylock+0x13/0x70 [ 268.213638] ? vprintk_emit+0x1eb/0x600 [ 268.213641] __down_trylock_console_sem+0x9c/0x200 [ 268.213642] console_trylock+0x17/0x80 [ 268.213644] vprintk_emit+0x1eb/0x600 [ 268.213646] vprintk_default+0x28/0x30 [ 268.213648] vprintk_func+0x5d/0x159 [ 268.213650] ? work_on_cpu_safe+0x80/0x80 [ 268.213652] printk+0x9e/0xbc [ 268.213654] ? show_regs_print_info+0x63/0x63 [ 268.213656] ? lock_acquire+0x16f/0x430 [ 268.213658] ? debug_check_no_obj_freed+0x12d/0x7b7 [ 268.213660] ? work_on_cpu_safe+0x80/0x80 [ 268.213662] debug_print_object.cold+0xa7/0xdb [ 268.213665] debug_check_no_obj_freed+0x3f5/0x7b7 [ 268.213667] ? free_obj_work+0x6d0/0x6d0 [ 268.213669] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 268.213671] kfree+0xbd/0x270 [ 268.213673] ? xps_cpus_show+0x600/0x600 [ 268.213675] kvfree+0x4d/0x60 [ 268.213677] netdev_freemem+0x4c/0x60 [ 268.213678] netdev_release+0x72/0x90 [ 268.213680] device_release+0x163/0x1a0 [ 268.213682] ? dev_attr_show+0xc0/0xc0 [ 268.213684] kobject_put+0x14e/0x210 [ 268.213687] ? batadv_get_drvinfo+0x140/0x140 [ 268.213688] netdev_run_todo+0x4e4/0x770 [ 268.213690] ? br_dev_open+0x70/0x70 [ 268.213692] ? netdev_info+0xf0/0xf0 [ 268.213694] ? dev_set_mtu+0x400/0x400 [ 268.213696] ? unregister_netdevice_queue+0x196/0x230 [ 268.213698] rtnl_unlock+0xe/0x10 [ 268.213701] default_device_exit_batch+0x328/0x3d0 [ 268.213703] ? unregister_netdevice_many+0x50/0x50 [ 268.213705] ? rtnl_unlock+0xe/0x10 [ 268.213707] ? do_wait_intr_irq+0x2a0/0x2a0 [ 268.213709] ? rtnl_unlock+0xe/0x10 [ 268.213711] ? unregister_netdevice_many+0x50/0x50 [ 268.213713] ? dev_change_net_namespace+0xa10/0xa10 [ 268.213716] ops_exit_list.isra.0+0xfc/0x150 [ 268.213717] cleanup_net+0x3ba/0x870 [ 268.213719] ? net_drop_ns+0x80/0x80 [ 268.213721] ? __lock_is_held+0xb6/0x140 [ 268.213724] ? check_preemption_disabled+0x3c/0x250 [ 268.213726] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 268.213728] process_one_work+0x863/0x1600 [ 268.213730] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 268.213732] worker_thread+0x5d9/0x1050 [ 268.213734] kthread+0x319/0x430 [ 268.213736] ? process_one_work+0x1600/0x1600 [ 268.213738] ? kthread_create_on_node+0xd0/0xd0 [ 268.213740] ret_from_fork+0x24/0x30 [ 268.222472] Kernel Offset: disabled [ 269.435770] Rebooting in 86400 seconds..