[  OK  ] Started Getty on tty2.
[  OK  ] Started Getty on tty1.
[  OK  ] Started Serial Getty on ttyS0.
[  OK  ] Started OpenBSD Secure Shell server.
[  OK  ] Started getty on tty2-tty6 if dbus and logind are not available.


Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.10.13' (ECDSA) to the list of known hosts.
2020/04/06 19:17:00 fuzzer started
syzkaller login: [   64.076539][ T7025] as (7025) used greatest stack depth: 23072 bytes left
2020/04/06 19:17:02 dialing manager at 10.128.0.26:45177
2020/04/06 19:17:02 syscalls: 2998
2020/04/06 19:17:02 code coverage: enabled
2020/04/06 19:17:02 comparison tracing: enabled
2020/04/06 19:17:02 extra coverage: enabled
2020/04/06 19:17:02 setuid sandbox: enabled
2020/04/06 19:17:02 namespace sandbox: enabled
2020/04/06 19:17:02 Android sandbox: /sys/fs/selinux/policy does not exist
2020/04/06 19:17:02 fault injection: enabled
2020/04/06 19:17:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2020/04/06 19:17:02 net packet injection: enabled
2020/04/06 19:17:02 net device setup: enabled
2020/04/06 19:17:02 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2020/04/06 19:17:02 devlink PCI setup: PCI device 0000:00:10.0 is not available
2020/04/06 19:17:02 USB emulation: /dev/raw-gadget does not exist
19:17:03 executing program 0:
r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f00000002c0)={0x2})

[   65.854270][ T7038] IPVS: ftp: loaded support on port[0] = 21
19:17:03 executing program 1:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x5, @dev, 'ip6gre0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

[   65.986482][ T7038] chnl_net:caif_netlink_parms(): no params data found
[   66.123043][ T7038] bridge0: port 1(bridge_slave_0) entered blocking state
[   66.135220][ T7038] bridge0: port 1(bridge_slave_0) entered disabled state
[   66.163766][ T7038] device bridge_slave_0 entered promiscuous mode
[   66.183770][ T7038] bridge0: port 2(bridge_slave_1) entered blocking state
[   66.190982][ T7038] bridge0: port 2(bridge_slave_1) entered disabled state
[   66.199909][ T7038] device bridge_slave_1 entered promiscuous mode
[   66.242022][ T7168] IPVS: ftp: loaded support on port[0] = 21
[   66.253439][ T7038] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   66.290857][ T7038] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
19:17:03 executing program 2:
syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d731c7bfcfcf58586c05abed99f3581a7a6a34835c7dbaeaba58c7b5ee3c124d386dfd3c86867e9695dbb790818e6c65d4837d7ecbe1c53678166c9958107639e6e45d0b9c4f65854b8d9939d06dd35f9a64f930ba3b1afa357d7d342162cd04e8022822474774ced79cf85eeb04f30c98ce3a21b1237", 0xbe, 0x10000}], 0x0, 0x0)

[   66.351012][ T7038] team0: Port device team_slave_0 added
[   66.387441][ T7038] team0: Port device team_slave_1 added
[   66.456337][ T7038] batman_adv: batadv0: Adding interface: batadv_slave_0
[   66.463349][ T7038] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   66.490869][ T7038] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   66.506092][ T7038] batman_adv: batadv0: Adding interface: batadv_slave_1
[   66.513070][ T7038] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   66.541480][ T7038] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   66.595941][ T7168] chnl_net:caif_netlink_parms(): no params data found
[   66.688585][ T7038] device hsr_slave_0 entered promiscuous mode
19:17:04 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a4800002a000505d25a80648c63940d0424fc60f64707400a000000053582c137153e370935018000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

[   66.775325][ T7038] device hsr_slave_1 entered promiscuous mode
[   66.865755][ T7295] IPVS: ftp: loaded support on port[0] = 21
[   67.000406][ T7340] IPVS: ftp: loaded support on port[0] = 21
[   67.011576][ T7168] bridge0: port 1(bridge_slave_0) entered blocking state
[   67.024655][ T7168] bridge0: port 1(bridge_slave_0) entered disabled state
[   67.032867][ T7168] device bridge_slave_0 entered promiscuous mode
[   67.080555][ T7168] bridge0: port 2(bridge_slave_1) entered blocking state
[   67.098637][ T7168] bridge0: port 2(bridge_slave_1) entered disabled state
[   67.110637][ T7168] device bridge_slave_1 entered promiscuous mode
19:17:04 executing program 4:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   67.199474][ T7168] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   67.225430][ T7168] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   67.339271][ T7168] team0: Port device team_slave_0 added
[   67.427889][ T7168] team0: Port device team_slave_1 added
[   67.520342][ T7038] netdevsim netdevsim0 netdevsim0: renamed from eth0
[   67.558911][ T7038] netdevsim netdevsim0 netdevsim1: renamed from eth1
19:17:05 executing program 5:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

[   67.655665][ T7038] netdevsim netdevsim0 netdevsim2: renamed from eth2
[   67.706515][ T7038] netdevsim netdevsim0 netdevsim3: renamed from eth3
[   67.786376][ T7168] batman_adv: batadv0: Adding interface: batadv_slave_0
[   67.793576][ T7168] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   67.821506][ T7168] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   67.836345][ T7295] chnl_net:caif_netlink_parms(): no params data found
[   67.840513][ T7474] IPVS: ftp: loaded support on port[0] = 21
[   67.856053][ T7340] chnl_net:caif_netlink_parms(): no params data found
[   67.868896][ T7168] batman_adv: batadv0: Adding interface: batadv_slave_1
[   67.876084][ T7168] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   67.903093][ T7168] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   67.921382][ T7595] IPVS: ftp: loaded support on port[0] = 21
[   67.989485][ T7168] device hsr_slave_0 entered promiscuous mode
[   68.033876][ T7168] device hsr_slave_1 entered promiscuous mode
[   68.073576][ T7168] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[   68.081512][ T7168] Cannot create hsr debugfs directory
[   68.341217][ T7340] bridge0: port 1(bridge_slave_0) entered blocking state
[   68.353027][ T7340] bridge0: port 1(bridge_slave_0) entered disabled state
[   68.362238][ T7340] device bridge_slave_0 entered promiscuous mode
[   68.393605][ T7295] bridge0: port 1(bridge_slave_0) entered blocking state
[   68.400700][ T7295] bridge0: port 1(bridge_slave_0) entered disabled state
[   68.411453][ T7295] device bridge_slave_0 entered promiscuous mode
[   68.433491][ T7340] bridge0: port 2(bridge_slave_1) entered blocking state
[   68.440590][ T7340] bridge0: port 2(bridge_slave_1) entered disabled state
[   68.449830][ T7340] device bridge_slave_1 entered promiscuous mode
[   68.476095][ T7295] bridge0: port 2(bridge_slave_1) entered blocking state
[   68.483176][ T7295] bridge0: port 2(bridge_slave_1) entered disabled state
[   68.491902][ T7295] device bridge_slave_1 entered promiscuous mode
[   68.561515][ T7340] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   68.626510][ T7295] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   68.641129][ T7295] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   68.657194][ T7340] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   68.677941][ T7474] chnl_net:caif_netlink_parms(): no params data found
[   68.788231][ T7595] chnl_net:caif_netlink_parms(): no params data found
[   68.817953][ T7295] team0: Port device team_slave_0 added
[   68.834998][ T7340] team0: Port device team_slave_0 added
[   68.880251][ T7295] team0: Port device team_slave_1 added
[   68.891322][ T7340] team0: Port device team_slave_1 added
[   68.948163][ T7340] batman_adv: batadv0: Adding interface: batadv_slave_0
[   68.958487][ T7340] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   68.990137][ T7340] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   69.034370][ T7038] 8021q: adding VLAN 0 to HW filter on device bond0
[   69.041806][ T7340] batman_adv: batadv0: Adding interface: batadv_slave_1
[   69.050230][ T7340] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   69.077335][ T7340] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   69.102672][ T7168] netdevsim netdevsim1 netdevsim0: renamed from eth0
[   69.146182][ T7295] batman_adv: batadv0: Adding interface: batadv_slave_0
[   69.153143][ T7295] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   69.183433][ T7295] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   69.218068][ T7474] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.226176][ T7474] bridge0: port 1(bridge_slave_0) entered disabled state
[   69.234661][ T7474] device bridge_slave_0 entered promiscuous mode
[   69.242187][ T7595] bridge0: port 1(bridge_slave_0) entered blocking state
[   69.249492][ T7595] bridge0: port 1(bridge_slave_0) entered disabled state
[   69.261856][ T7595] device bridge_slave_0 entered promiscuous mode
[   69.269612][ T7168] netdevsim netdevsim1 netdevsim1: renamed from eth1
[   69.331144][ T7295] batman_adv: batadv0: Adding interface: batadv_slave_1
[   69.338717][ T7295] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   69.365104][ T7295] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   69.396909][ T7474] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.407076][ T7474] bridge0: port 2(bridge_slave_1) entered disabled state
[   69.415740][ T7474] device bridge_slave_1 entered promiscuous mode
[   69.423032][ T7595] bridge0: port 2(bridge_slave_1) entered blocking state
[   69.430609][ T7595] bridge0: port 2(bridge_slave_1) entered disabled state
[   69.438897][ T7595] device bridge_slave_1 entered promiscuous mode
[   69.454222][ T7168] netdevsim netdevsim1 netdevsim2: renamed from eth2
[   69.545845][ T7295] device hsr_slave_0 entered promiscuous mode
[   69.583645][ T7295] device hsr_slave_1 entered promiscuous mode
[   69.623325][ T7295] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[   69.630942][ T7295] Cannot create hsr debugfs directory
[   69.651020][ T7168] netdevsim netdevsim1 netdevsim3: renamed from eth3
[   69.711127][ T7038] 8021q: adding VLAN 0 to HW filter on device team0
[   69.786190][ T7340] device hsr_slave_0 entered promiscuous mode
[   69.823626][ T7340] device hsr_slave_1 entered promiscuous mode
[   69.873385][ T7340] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[   69.880981][ T7340] Cannot create hsr debugfs directory
[   69.906993][ T7595] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   69.919941][ T7595] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   69.931383][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   69.941287][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   69.957501][ T7474] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   70.004702][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   70.014391][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   70.022877][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state
[   70.030129][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state
[   70.041810][ T7474] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   70.104872][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   70.113041][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   70.128745][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   70.139026][ T2997] bridge0: port 2(bridge_slave_1) entered blocking state
[   70.146186][ T2997] bridge0: port 2(bridge_slave_1) entered forwarding state
[   70.170566][ T7595] team0: Port device team_slave_0 added
[   70.199405][ T7474] team0: Port device team_slave_0 added
[   70.214701][ T7595] team0: Port device team_slave_1 added
[   70.237854][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   70.247378][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   70.275921][ T7474] team0: Port device team_slave_1 added
[   70.358950][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   70.368335][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   70.392626][ T7038] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[   70.405411][ T7038] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   70.426406][ T7474] batman_adv: batadv0: Adding interface: batadv_slave_0
[   70.434539][ T7474] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   70.461903][ T7474] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   70.485845][ T7595] batman_adv: batadv0: Adding interface: batadv_slave_0
[   70.492817][ T7595] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   70.520526][ T7595] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   70.536845][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   70.546064][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   70.556758][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   70.566266][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   70.576072][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   70.585997][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   70.596665][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   70.606386][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   70.622640][ T7474] batman_adv: batadv0: Adding interface: batadv_slave_1
[   70.630575][ T7474] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   70.657196][ T7474] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   70.672804][ T7595] batman_adv: batadv0: Adding interface: batadv_slave_1
[   70.695725][ T7595] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   70.721808][ T7595] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   70.825904][ T7595] device hsr_slave_0 entered promiscuous mode
[   70.863539][ T7595] device hsr_slave_1 entered promiscuous mode
[   70.893289][ T7595] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[   70.900880][ T7595] Cannot create hsr debugfs directory
[   70.928733][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   70.936742][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   70.956009][ T7038] 8021q: adding VLAN 0 to HW filter on device batadv0
[   71.007559][ T7474] device hsr_slave_0 entered promiscuous mode
[   71.063471][ T7474] device hsr_slave_1 entered promiscuous mode
[   71.103310][ T7474] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[   71.110888][ T7474] Cannot create hsr debugfs directory
[   71.193810][ T7295] netdevsim netdevsim2 netdevsim0: renamed from eth0
[   71.216302][ T7295] netdevsim netdevsim2 netdevsim1: renamed from eth1
[   71.252656][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   71.264085][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   71.308591][ T7295] netdevsim netdevsim2 netdevsim2: renamed from eth2
[   71.379977][ T7038] device veth0_vlan entered promiscuous mode
[   71.397106][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   71.406004][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   71.420381][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   71.429770][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   71.441477][ T7295] netdevsim netdevsim2 netdevsim3: renamed from eth3
[   71.511684][ T7340] netdevsim netdevsim3 netdevsim0: renamed from eth0
[   71.561346][ T7340] netdevsim netdevsim3 netdevsim1: renamed from eth1
[   71.607624][ T7168] 8021q: adding VLAN 0 to HW filter on device bond0
[   71.637143][ T7340] netdevsim netdevsim3 netdevsim2: renamed from eth2
[   71.680545][ T7038] device veth1_vlan entered promiscuous mode
[   71.716586][ T7340] netdevsim netdevsim3 netdevsim3: renamed from eth3
[   71.777457][ T7168] 8021q: adding VLAN 0 to HW filter on device team0
[   71.809602][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   71.819601][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   71.879119][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   71.891359][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   71.900092][ T2694] bridge0: port 1(bridge_slave_0) entered blocking state
[   71.907228][ T2694] bridge0: port 1(bridge_slave_0) entered forwarding state
[   71.916103][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   71.924991][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   71.933680][ T2694] bridge0: port 2(bridge_slave_1) entered blocking state
[   71.940738][ T2694] bridge0: port 2(bridge_slave_1) entered forwarding state
[   71.987127][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   71.997534][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   72.006885][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   72.017928][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   72.027243][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   72.069127][ T7038] device veth0_macvtap entered promiscuous mode
[   72.095557][ T7474] netdevsim netdevsim4 netdevsim0: renamed from eth0
[   72.117418][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   72.125993][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   72.135898][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   72.146850][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   72.171738][ T7474] netdevsim netdevsim4 netdevsim1: renamed from eth1
[   72.220124][ T7038] device veth1_macvtap entered promiscuous mode
[   72.232127][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   72.241915][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   72.251381][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   72.264343][ T7474] netdevsim netdevsim4 netdevsim2: renamed from eth2
[   72.328941][ T7474] netdevsim netdevsim4 netdevsim3: renamed from eth3
[   72.395946][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   72.405501][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   72.426268][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   72.439003][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   72.451420][ T7595] netdevsim netdevsim5 netdevsim0: renamed from eth0
[   72.505348][ T7595] netdevsim netdevsim5 netdevsim1: renamed from eth1
[   72.547599][ T7595] netdevsim netdevsim5 netdevsim2: renamed from eth2
[   72.620572][ T7595] netdevsim netdevsim5 netdevsim3: renamed from eth3
[   72.715882][ T7038] batman_adv: batadv0: Interface activated: batadv_slave_0
[   72.737182][ T7295] 8021q: adding VLAN 0 to HW filter on device bond0
[   72.745838][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   72.756078][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   72.770627][ T7038] batman_adv: batadv0: Interface activated: batadv_slave_1
[   72.792170][ T7168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   72.807387][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   72.816584][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   72.983809][ T7168] 8021q: adding VLAN 0 to HW filter on device batadv0
[   73.032636][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   73.040703][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   73.060639][ T7295] 8021q: adding VLAN 0 to HW filter on device team0
[   73.080144][ T7340] 8021q: adding VLAN 0 to HW filter on device bond0
[   73.107763][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   73.120555][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
19:17:10 executing program 0:
r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f00000002c0)={0x2})

[   73.179423][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   73.191818][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   73.223565][ T2997] bridge0: port 1(bridge_slave_0) entered blocking state
[   73.230678][ T2997] bridge0: port 1(bridge_slave_0) entered forwarding state
[   73.245302][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   73.259700][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
19:17:10 executing program 0:
r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f00000002c0)={0x2})

[   73.277781][ T2997] bridge0: port 2(bridge_slave_1) entered blocking state
[   73.285010][ T2997] bridge0: port 2(bridge_slave_1) entered forwarding state
[   73.303438][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   73.386279][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   73.402130][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
19:17:11 executing program 0:
r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f00000002c0)={0x2})

[   73.436224][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   73.458318][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
19:17:11 executing program 0:
r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f00000002c0)={0x2})

[   73.480420][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   73.504246][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
19:17:11 executing program 0:
r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f00000002c0)={0x2})

[   73.540960][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   73.560974][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
19:17:11 executing program 0:
r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f00000002c0)={0x2})

[   73.605881][ T7340] 8021q: adding VLAN 0 to HW filter on device team0
[   73.619693][ T7474] 8021q: adding VLAN 0 to HW filter on device bond0
[   73.657936][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   73.672060][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
19:17:11 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

[   73.719882][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   73.745404][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   73.770146][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   73.831629][ T7295] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   73.848443][ T7295] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   73.859369][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   73.868822][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   73.881007][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   73.891936][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   73.901538][ T2997] bridge0: port 1(bridge_slave_0) entered blocking state
[   73.908671][ T2997] bridge0: port 1(bridge_slave_0) entered forwarding state
[   73.917777][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   73.926041][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   73.934440][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   73.943364][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   73.951694][ T2997] bridge0: port 2(bridge_slave_1) entered blocking state
[   73.958794][ T2997] bridge0: port 2(bridge_slave_1) entered forwarding state
[   73.967308][ T8312] INFO: trying to register non-static key.
[   73.967719][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   73.973121][ T8312] the code is fine but needs lockdep annotation.
[   73.973126][ T8312] turning off the locking correctness validator.
[   73.973141][ T8312] CPU: 1 PID: 8312 Comm: syz-executor.0 Not tainted 5.6.0-next-20200406-syzkaller #0
[   73.973149][ T8312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   73.973153][ T8312] Call Trace:
[   73.973177][ T8312]  dump_stack+0x188/0x20d
[   73.973195][ T8312]  register_lock_class+0x1664/0x1760
[   73.973219][ T8312]  ? check_usage_forwards+0x482/0x4e0
[   73.981619][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   73.987152][ T8312]  ? is_dynamic_key+0x1a0/0x1a0
[   73.987166][ T8312]  ? save_stack+0x32/0x40
[   73.987182][ T8312]  __lock_acquire+0x104/0x4e00
[   73.987205][ T8312]  ? __debug_object_init+0x4ae/0xe20
[   73.994445][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   74.002949][ T8312]  ? print_usage_bug+0x240/0x240
[   74.002961][ T8312]  ? mark_lock+0x12b/0xf10
[   74.002972][ T8312]  ? lock_downgrade+0x840/0x840
[   74.002984][ T8312]  ? mark_held_locks+0xe0/0xe0
[   74.003004][ T8312]  ? mark_held_locks+0x9f/0xe0
[   74.013791][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   74.016333][ T8312]  ? _raw_spin_unlock_irqrestore+0x62/0xe0
[   74.021162][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   74.025916][ T8312]  ? lockdep_hardirqs_on+0x463/0x620
[   74.025929][ T8312]  lock_acquire+0x1f2/0x8f0
[   74.025941][ T8312]  ? __io_uring_register+0x1fe8/0x2f00
[   74.025954][ T8312]  ? lock_release+0x800/0x800
[   74.025966][ T8312]  ? free_object+0x70/0x70
[   74.025987][ T8312]  _raw_spin_lock_irqsave+0x8c/0xbf
[   74.052977][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   74.058118][ T8312]  ? __io_uring_register+0x1fe8/0x2f00
[   74.058135][ T8312]  __io_uring_register+0x1fe8/0x2f00
[   74.066752][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   74.070415][ T8312]  ? mutex_trylock+0x2c0/0x2c0
[   74.070435][ T8312]  ? __fget_files+0x32f/0x500
[   74.077931][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   74.079681][ T8312]  ? io_cqring_wait+0x950/0x950
[   74.079700][ T8312]  ? do_dup2+0x520/0x520
[   74.086772][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   74.089184][ T8312]  ? __x64_sys_futex+0x380/0x4f0
[   74.089204][ T8312]  __x64_sys_io_uring_register+0x192/0x560
[   74.098504][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   74.102175][ T8312]  ? do_syscall_64+0x21/0x7d0
[   74.102195][ T8312]  do_syscall_64+0xf6/0x7d0
[   74.226254][ T8312]  entry_SYSCALL_64_after_hwframe+0x49/0xb3
[   74.232123][ T8312] RIP: 0033:0x45c879
[   74.236001][ T8312] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[   74.255589][ T8312] RSP: 002b:00007ff7d717ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab
[   74.263988][ T8312] RAX: ffffffffffffffda RBX: 00007ff7d717f6d4 RCX: 000000000045c879
[   74.271943][ T8312] RDX: 0000000020000280 RSI: 0000000000000002 RDI: 0000000000000005
[   74.279899][ T8312] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000
[   74.287853][ T8312] R10: 0000000000000001 R11: 0000000000000246 R12: 00000000ffffffff
[   74.295862][ T8312] R13: 00000000000001fd R14: 00000000004d2f40 R15: 000000000076bf0c
[   74.318753][ T7595] 8021q: adding VLAN 0 to HW filter on device bond0
[   74.327607][ T7474] 8021q: adding VLAN 0 to HW filter on device team0
[   74.335917][ T7168] device veth0_vlan entered promiscuous mode
[   74.362543][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   74.371325][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   74.380329][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   74.388887][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   74.397328][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   74.405662][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   74.413921][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   74.421433][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   74.436024][ T7595] 8021q: adding VLAN 0 to HW filter on device team0
[   74.448896][ T7168] device veth1_vlan entered promiscuous mode
[   74.462178][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   74.470381][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[   74.478727][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   74.487850][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   74.496520][    T5] bridge0: port 1(bridge_slave_0) entered blocking state
[   74.503627][    T5] bridge0: port 1(bridge_slave_0) entered forwarding state
[   74.511502][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   74.519132][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   74.533093][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   74.541816][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   74.551254][    T5] bridge0: port 1(bridge_slave_0) entered blocking state
[   74.558422][    T5] bridge0: port 1(bridge_slave_0) entered forwarding state
[   74.566189][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   74.575146][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   74.583613][    T5] bridge0: port 2(bridge_slave_1) entered blocking state
[   74.590667][    T5] bridge0: port 2(bridge_slave_1) entered forwarding state
[   74.605572][ T7295] 8021q: adding VLAN 0 to HW filter on device batadv0
[   74.616342][ T7340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   74.663558][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   74.671833][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   74.685836][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   74.695531][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   74.704451][ T2997] bridge0: port 2(bridge_slave_1) entered blocking state
[   74.711560][ T2997] bridge0: port 2(bridge_slave_1) entered forwarding state
[   74.719855][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   74.728769][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   74.737554][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   74.746341][ T2997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   74.764847][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   74.774011][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   74.782625][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   74.791444][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   74.800507][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   74.833006][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   74.840729][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   74.856025][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   74.865837][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   74.874943][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   74.885018][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   74.894226][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   74.902506][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   74.911530][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   74.920322][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   74.929399][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   74.938322][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   74.947150][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   74.956532][ T7168] device veth0_macvtap entered promiscuous mode
[   74.969603][ T7168] device veth1_macvtap entered promiscuous mode
[   74.986498][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   74.995424][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   75.004251][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   75.012560][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   75.039158][ T7474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   75.049387][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   75.060689][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   75.070209][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   75.086909][ T7168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   75.098073][ T7168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   75.109617][ T7168] batman_adv: batadv0: Interface activated: batadv_slave_0
[   75.120075][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   75.128779][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   75.137421][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   75.146468][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   75.155795][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   75.164299][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   75.173010][ T7295] device veth0_vlan entered promiscuous mode
[   75.187836][ T7168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   75.198363][ T7168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   75.209808][ T7168] batman_adv: batadv0: Interface activated: batadv_slave_1
[   75.234913][ T7595] 8021q: adding VLAN 0 to HW filter on device batadv0
[   75.242024][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   75.250170][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   75.258711][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   75.267897][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   75.276970][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   75.284948][   T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   75.300815][ T7295] device veth1_vlan entered promiscuous mode
[   75.359381][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   75.369429][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[   75.378660][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   75.386568][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   75.396060][ T7340] 8021q: adding VLAN 0 to HW filter on device batadv0
[   75.408745][ T7474] 8021q: adding VLAN 0 to HW filter on device batadv0
[   75.525089][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   75.541894][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   75.580822][ T7295] device veth0_macvtap entered promiscuous mode
[   75.603032][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   75.611231][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
19:17:13 executing program 1:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x5, @dev, 'ip6gre0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

[   75.632150][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   75.658227][ T7295] device veth1_macvtap entered promiscuous mode
[   75.688006][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   75.698013][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   75.707687][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   75.755516][ T7595] device veth0_vlan entered promiscuous mode
[   75.777376][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   75.804573][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   75.819533][ T7340] device veth0_vlan entered promiscuous mode
[   75.835992][ T7295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   75.854760][ T7295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   75.867089][ T7295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   75.877655][ T7295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   75.889750][ T7295] batman_adv: batadv0: Interface activated: batadv_slave_0
[   75.897715][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   75.907449][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   75.915741][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   75.925558][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   75.934273][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   75.943061][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   75.952135][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   75.961557][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   75.971987][ T7340] device veth1_vlan entered promiscuous mode
[   75.995869][ T7595] device veth1_vlan entered promiscuous mode
[   76.009665][ T7295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   76.021282][ T7295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.031966][ T7295] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   76.042787][ T7295] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.054080][ T7295] batman_adv: batadv0: Interface activated: batadv_slave_1
[   76.075551][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   76.083650][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[   76.091746][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   76.101648][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[   76.109946][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   76.120464][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   76.129901][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   76.138862][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   76.225053][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   76.234845][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   76.243322][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   76.251788][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   76.261276][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   76.269370][ T2694] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   76.281002][ T7474] device veth0_vlan entered promiscuous mode
[   76.292014][ T7340] device veth0_macvtap entered promiscuous mode
[   76.415468][ T7595] device veth0_macvtap entered promiscuous mode
[   76.426625][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   76.436576][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   76.448365][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   76.464914][ T7474] device veth1_vlan entered promiscuous mode
[   76.478110][ T8344] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 9693424239901351027 /dev/loop2 scanned by syz-executor.2 (8344)
[   76.494306][ T7340] device veth1_macvtap entered promiscuous mode
[   76.505396][ T7595] device veth1_macvtap entered promiscuous mode
19:17:14 executing program 2:
syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d731c7bfcfcf58586c05abed99f3581a7a6a34835c7dbaeaba58c7b5ee3c124d386dfd3c86867e9695dbb790818e6c65d4837d7ecbe1c53678166c9958107639e6e45d0b9c4f65854b8d9939d06dd35f9a64f930ba3b1afa357d7d342162cd04e8022822474774ced79cf85eeb04f30c98ce3a21b1237", 0xbe, 0x10000}], 0x0, 0x0)

[   76.517863][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   76.528657][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   76.537362][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   76.545989][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   76.590668][ T7595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   76.601564][ T7595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.614391][ T7595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   76.626216][ T7595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.641343][ T7595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   76.653084][ T7595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.668268][ T7595] batman_adv: batadv0: Interface activated: batadv_slave_0
[   76.690185][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   76.705473][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.718602][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   76.740457][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.750362][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   76.763887][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.774784][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   76.785614][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.796681][ T7340] batman_adv: batadv0: Interface activated: batadv_slave_0
[   76.804472][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[   76.814717][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   76.823490][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   76.831888][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   76.842546][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   76.859052][ T7474] device veth0_macvtap entered promiscuous mode
[   76.870165][ T7595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   76.882375][ T7595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.893074][ T7595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   76.903803][ T7595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.913886][ T7595] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   76.925692][ T7595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.939519][ T7595] batman_adv: batadv0: Interface activated: batadv_slave_1
[   76.951210][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   76.962546][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.972952][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   76.983834][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   76.994178][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   77.005942][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   77.016206][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   77.027042][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   77.038250][ T7340] batman_adv: batadv0: Interface activated: batadv_slave_1
[   77.047324][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   77.056666][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   77.065401][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   77.074478][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   77.083555][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   77.092023][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   77.104552][ T7474] device veth1_macvtap entered promiscuous mode
[   77.123103][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   77.131213][ T2785] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   77.377414][ T7474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   77.387956][ T7474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   77.398058][ T7474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   77.409141][ T7474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   77.419892][ T7474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   77.430658][ T7474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   77.440798][ T7474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   77.451603][ T7474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   77.461492][ T7474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[   77.472003][ T7474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   77.484685][ T7474] batman_adv: batadv0: Interface activated: batadv_slave_0
[   77.554417][ T8356] llc_conn_state_process: llc_conn_service failed
[   77.595655][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   77.605931][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   77.631556][ T7474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   77.649378][ T7474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   77.660626][ T7474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   77.675710][ T7474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   77.688743][ T7474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
19:17:15 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a4800002a000505d25a80648c63940d0424fc60f64707400a000000053582c137153e370935018000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

[   77.716503][ T7474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   77.727201][ T7474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   77.740845][ T7474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   77.751869][ T7474] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[   77.770014][ T7474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   77.799370][ T7474] batman_adv: batadv0: Interface activated: batadv_slave_1
[   77.813110][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   77.821718][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
19:17:15 executing program 4:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:15 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:15 executing program 2:
syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d731c7bfcfcf58586c05abed99f3581a7a6a34835c7dbaeaba58c7b5ee3c124d386dfd3c86867e9695dbb790818e6c65d4837d7ecbe1c53678166c9958107639e6e45d0b9c4f65854b8d9939d06dd35f9a64f930ba3b1afa357d7d342162cd04e8022822474774ced79cf85eeb04f30c98ce3a21b1237", 0xbe, 0x10000}], 0x0, 0x0)

19:17:15 executing program 1:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x5, @dev, 'ip6gre0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

19:17:15 executing program 5:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:15 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a4800002a000505d25a80648c63940d0424fc60f64707400a000000053582c137153e370935018000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

[   78.069204][ T8372] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables
[   78.080070][ T8372] ipt_CLUSTERIP: Please specify destination IP
19:17:15 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a4800002a000505d25a80648c63940d0424fc60f64707400a000000053582c137153e370935018000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

[   78.143825][ T8383] llc_conn_state_process: llc_conn_service failed
[   78.183793][ T8391] ipt_CLUSTERIP: Please specify destination IP
19:17:15 executing program 1:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x5, @dev, 'ip6gre0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

19:17:15 executing program 5:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:15 executing program 4:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:15 executing program 2:
syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000001c0)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d731c7bfcfcf58586c05abed99f3581a7a6a34835c7dbaeaba58c7b5ee3c124d386dfd3c86867e9695dbb790818e6c65d4837d7ecbe1c53678166c9958107639e6e45d0b9c4f65854b8d9939d06dd35f9a64f930ba3b1afa357d7d342162cd04e8022822474774ced79cf85eeb04f30c98ce3a21b1237", 0xbe, 0x10000}], 0x0, 0x0)

[   78.302237][ T8404] llc_conn_state_process: llc_conn_service failed
19:17:15 executing program 3:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:15 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:16 executing program 5:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

[   78.345667][ T8406] ipt_CLUSTERIP: Please specify destination IP
19:17:16 executing program 4:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   78.482379][ T8413] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables
[   78.488980][ T8419] llc_conn_state_process: llc_conn_service failed
19:17:16 executing program 1:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 2:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 3:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 5:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   78.542351][ T8413] ipt_CLUSTERIP: Please specify destination IP
[   78.622283][ T8429] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables
[   78.626683][ T8430] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables
[   78.641703][ T8429] ipt_CLUSTERIP: Please specify destination IP
[   78.644683][ T8432] ipt_CLUSTERIP: Please specify destination IP
19:17:16 executing program 1:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 4:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:16 executing program 3:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   78.666588][ T8426] ipt_CLUSTERIP: Please specify destination IP
[   78.675918][ T8436] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables
[   78.711826][ T8436] ipt_CLUSTERIP: Please specify destination IP
19:17:16 executing program 5:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 1:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 5:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   78.733029][ T8430] ipt_CLUSTERIP: Please specify destination IP
[   78.752495][    C1] hrtimer: interrupt took 40194 ns
[   78.755065][ T8441] ipt_CLUSTERIP: Please specify destination IP
[   78.760241][ T8444] ipt_CLUSTERIP: Please specify destination IP
19:17:16 executing program 2:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 4:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   78.810529][ T8449] ipt_CLUSTERIP: Please specify destination IP
[   78.845277][ T8451] ipt_CLUSTERIP: Please specify destination IP
19:17:16 executing program 3:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 2:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   78.911413][ T8460] ipt_CLUSTERIP: Please specify destination IP
[   78.913114][ T8464] ipt_CLUSTERIP: Please specify destination IP
[   78.939060][ T8462] ipt_CLUSTERIP: Please specify destination IP
19:17:16 executing program 1:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 5:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 4:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   78.992375][ T8468] ipt_CLUSTERIP: Please specify destination IP
[   78.994170][ T8470] ipt_CLUSTERIP: Please specify destination IP
19:17:16 executing program 3:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 0:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 5:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 2:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   79.068995][ T8476] ipt_CLUSTERIP: Please specify destination IP
[   79.101973][ T8480] ipt_CLUSTERIP: Please specify destination IP
[   79.102955][ T8477] ipt_CLUSTERIP: Please specify destination IP
19:17:16 executing program 3:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 1:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   79.129692][ T8482] ipt_CLUSTERIP: Please specify destination IP
[   79.152705][ T8487] ipt_CLUSTERIP: Please specify destination IP
[   79.156312][ T8488] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables
19:17:16 executing program 4:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 0:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 2:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   79.190672][ T8491] ipt_CLUSTERIP: Please specify destination IP
[   79.208816][ T8488] ipt_CLUSTERIP: Please specify destination IP
[   79.216319][ T8496] ipt_CLUSTERIP: Please specify destination IP
19:17:16 executing program 5:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 1:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   79.251302][ T8500] ipt_CLUSTERIP: Please specify destination IP
[   79.287234][ T8502] ipt_CLUSTERIP: Please specify destination IP
19:17:16 executing program 3:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:16 executing program 0:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 2:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:16 executing program 4:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

[   79.309740][ T8507] ipt_CLUSTERIP: Please specify destination IP
[   79.317321][ T8508] ipt_CLUSTERIP: Please specify destination IP
[   79.348763][ T8510] ipt_CLUSTERIP: Please specify destination IP
19:17:17 executing program 1:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 5:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

[   79.382782][ T8515] ipt_CLUSTERIP: Please specify destination IP
[   79.390406][ T8518] llc_conn_state_process: llc_conn_service failed
[   79.398103][ T8514] ipt_CLUSTERIP: Please specify destination IP
19:17:17 executing program 2:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

[   79.445553][ T8524] ipt_CLUSTERIP: Please specify destination IP
[   79.484486][ T8526] ipt_CLUSTERIP: Please specify destination IP
19:17:17 executing program 3:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 4:
socket$bt_bnep(0x1f, 0x3, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x29, 0x2, 0x0)
close(r0)
newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x100)
openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0)
r1 = open(&(0x7f0000000400)='./file0\x00', 0x800, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0)
ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1})
ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc074510c, 0x0)
clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r2, 0xffffff0f00000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x318, 0x1b0, 0x1b0, 0x0, 0x1b0, 0x1b0, 0x280, 0x280, 0x280, 0x280, 0x280, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1b0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x2, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x378)

19:17:17 executing program 0:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

[   79.498089][ T8528] ipt_CLUSTERIP: Please specify destination IP
[   79.523942][ T8532] llc_conn_state_process: llc_conn_service failed
[   79.526837][ T8534] llc_conn_state_process: llc_conn_service failed
[   79.576985][ T8537] llc_conn_state_process: llc_conn_service failed
[   79.599473][ T8542] llc_conn_state_process: llc_conn_service failed
[   79.633087][ T8543] ipt_CLUSTERIP: Please specify destination IP
[   79.668098][ T8544] llc_conn_state_process: llc_conn_service failed
19:17:17 executing program 1:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 3:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 5:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 4:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 2:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 0:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

[   79.785877][ T8554] llc_conn_state_process: llc_conn_service failed
[   79.791645][ T8555] llc_conn_state_process: llc_conn_service failed
[   79.795130][ T8553] llc_conn_state_process: llc_conn_service failed
[   79.806904][ T8557] llc_conn_state_process: llc_conn_service failed
[   79.818035][ T8556] llc_conn_state_process: llc_conn_service failed
19:17:17 executing program 1:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 5:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 3:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 0:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 2:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 4:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 5:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 1:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a4800002a000505d25a80648c63940d0424fc60f64707400a000000053582c137153e370935018000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

19:17:17 executing program 5:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 3:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 1:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a4800002a000505d25a80648c63940d0424fc60f64707400a000000053582c137153e370935018000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

19:17:17 executing program 4:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 0:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x5, @dev, 'ip6gre0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

19:17:17 executing program 2:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x5, @dev, 'ip6gre0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

19:17:17 executing program 1:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="0a4800002a000505d25a80648c63940d0424fc60f64707400a000000053582c137153e370935018000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

19:17:17 executing program 3:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 5:
r0 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0)
socket$phonet_pipe(0x23, 0x5, 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0)
connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x10)
listen(r1, 0x0)
listen(r1, 0x0)

19:17:17 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:17 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:17 executing program 2:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x5, @dev, 'ip6gre0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

19:17:18 executing program 0:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x5, @dev, 'ip6gre0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

19:17:18 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:18 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:18 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:18 executing program 0:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x5, @dev, 'ip6gre0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

19:17:18 executing program 2:
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x5, @dev, 'ip6gre0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0)

19:17:18 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:18 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:18 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "502b9fdf57dcfe21", "4efcf0cd78ac0fd9d43071201668cd682130965022e378a8a5a7f1e9e3f733bb", "cb5d0048", "a9f9ee4900200008"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff5d, 0x0, 0x0, 0x0)

19:17:18 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:18 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

[   80.760304][    C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
19:17:18 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:18 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:18 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:18 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:18 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:18 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="ff0d1aa3af5734c1e2eb2394bbbf77f8"}, 0x1c)
r3 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000006299eb6284070000000000fd85d1ee7930af0ac3794899000000000005000000000000000000d94bfeadbfce0d4ed61c013b3c42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000ee010000000100000040200000"], 0xb8}}, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:17:18 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00')
sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x18, r1, 0x305, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}}, 0x0)
socket(0x18, 0x0, 0x0)

19:17:18 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
r2 = io_uring_setup(0xa4, &(0x7f0000000080))
io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1)

19:17:18 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="ff0d1aa3af5734c1e2eb2394bbbf77f8"}, 0x1c)
r3 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000006299eb6284070000000000fd85d1ee7930af0ac3794899000000000005000000000000000000d94bfeadbfce0d4ed61c013b3c42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000ee010000000100000040200000"], 0xb8}}, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:17:19 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "502b9fdf57dcfe21", "4efcf0cd78ac0fd9d43071201668cd682130965022e378a8a5a7f1e9e3f733bb", "cb5d0048", "a9f9ee4900200008"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff5d, 0x0, 0x0, 0x0)

19:17:19 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00')
sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x18, r1, 0x305, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}}, 0x0)
socket(0x18, 0x0, 0x0)

19:17:19 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="ff0d1aa3af5734c1e2eb2394bbbf77f8"}, 0x1c)
r3 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000006299eb6284070000000000fd85d1ee7930af0ac3794899000000000005000000000000000000d94bfeadbfce0d4ed61c013b3c42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000ee010000000100000040200000"], 0xb8}}, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[   81.555699][    C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
19:17:19 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00')
sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x18, r1, 0x305, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}}, 0x0)
socket(0x18, 0x0, 0x0)

19:17:19 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="ff0d1aa3af5734c1e2eb2394bbbf77f8"}, 0x1c)
r3 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000006299eb6284070000000000fd85d1ee7930af0ac3794899000000000005000000000000000000d94bfeadbfce0d4ed61c013b3c42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000ee010000000100000040200000"], 0xb8}}, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:17:19 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00')
sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x18, r1, 0x305, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}}, 0x0)
socket(0x18, 0x0, 0x0)

19:17:19 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00')
sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x18, r1, 0x305, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}}, 0x0)
socket(0x18, 0x0, 0x0)

[   81.667431][    C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
19:17:19 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00')
sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x18, r1, 0x305, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}}, 0x0)
socket(0x18, 0x0, 0x0)

19:17:19 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00')
sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x18, r1, 0x305, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}}, 0x0)
socket(0x18, 0x0, 0x0)

19:17:19 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00')
sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x18, r1, 0x305, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}}, 0x0)
socket(0x18, 0x0, 0x0)

19:17:19 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "502b9fdf57dcfe21", "4efcf0cd78ac0fd9d43071201668cd682130965022e378a8a5a7f1e9e3f733bb", "cb5d0048", "a9f9ee4900200008"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff5d, 0x0, 0x0, 0x0)

19:17:19 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="ff0d1aa3af5734c1e2eb2394bbbf77f8"}, 0x1c)
r3 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000006299eb6284070000000000fd85d1ee7930af0ac3794899000000000005000000000000000000d94bfeadbfce0d4ed61c013b3c42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000ee010000000100000040200000"], 0xb8}}, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

[   81.924306][    C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
19:17:20 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "502b9fdf57dcfe21", "4efcf0cd78ac0fd9d43071201668cd682130965022e378a8a5a7f1e9e3f733bb", "cb5d0048", "a9f9ee4900200008"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff5d, 0x0, 0x0, 0x0)

19:17:20 executing program 1:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="ff0d1aa3af5734c1e2eb2394bbbf77f8"}, 0x1c)
r3 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000006299eb6284070000000000fd85d1ee7930af0ac3794899000000000005000000000000000000d94bfeadbfce0d4ed61c013b3c42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000ee010000000100000040200000"], 0xb8}}, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:17:20 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00')
sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x18, r1, 0x305, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}}, 0x0)
socket(0x18, 0x0, 0x0)

19:17:20 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00')
sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x18, r1, 0x305, 0x0, 0x0, {0x2}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}}, 0x0)
socket(0x18, 0x0, 0x0)

19:17:20 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="ff0d1aa3af5734c1e2eb2394bbbf77f8"}, 0x1c)
r3 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000006299eb6284070000000000fd85d1ee7930af0ac3794899000000000005000000000000000000d94bfeadbfce0d4ed61c013b3c42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000ee010000000100000040200000"], 0xb8}}, 0x0)
sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0)

19:17:20 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "502b9fdf57dcfe21", "4efcf0cd78ac0fd9d43071201668cd682130965022e378a8a5a7f1e9e3f733bb", "cb5d0048", "a9f9ee4900200008"}, 0x38)
sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff5d, 0x0, 0x0, 0x0)

19:17:20 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152)
setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "502b9fdf57dcfe21", "4efcf0cd78ac0fd9d43071201668cd682130965022e378a8a5a7f1e9e3f733bb", "cb5d0048", "a9f9ee4900200008"}, 0x38)
s