[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 76.901841][ T27] audit: type=1800 audit(1583948700.200:25): pid=9224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 76.921675][ T27] audit: type=1800 audit(1583948700.210:26): pid=9224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 76.942351][ T27] audit: type=1800 audit(1583948700.210:27): pid=9224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.156' (ECDSA) to the list of known hosts. 2020/03/11 17:45:10 fuzzer started 2020/03/11 17:45:12 dialing manager at 10.128.0.26:41905 2020/03/11 17:45:12 syscalls: 1380 2020/03/11 17:45:12 code coverage: enabled 2020/03/11 17:45:12 comparison tracing: ioctl(KCOV_DISABLE) failed: invalid argument 2020/03/11 17:45:12 extra coverage: enabled 2020/03/11 17:45:12 setuid sandbox: enabled 2020/03/11 17:45:12 namespace sandbox: enabled 2020/03/11 17:45:12 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/11 17:45:12 fault injection: enabled 2020/03/11 17:45:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/11 17:45:12 net packet injection: enabled 2020/03/11 17:45:12 net device setup: enabled 2020/03/11 17:45:12 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/11 17:45:12 devlink PCI setup: PCI device 0000:00:10.0 is not available 17:47:02 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000300)=0x1, 0x3e1) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r1, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r2, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r4, &(0x7f0000000200)={0xa, 0x4e20}, 0x1c) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r5, &(0x7f0000000200)={0xa, 0x4e20}, 0x1c) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r6, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r6, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r7, &(0x7f0000000200)={0xa, 0x4e20}, 0x1c) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r8, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r8, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r9 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r9, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r9, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r10 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r10, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r10, &(0x7f0000000200)={0xa, 0x4e20}, 0x1c) r11 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r11, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r11, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) 17:47:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x3a, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) syzkaller login: [ 199.246182][ T9392] IPVS: ftp: loaded support on port[0] = 21 [ 199.414465][ T9395] IPVS: ftp: loaded support on port[0] = 21 [ 199.420652][ T9392] chnl_net:caif_netlink_parms(): no params data found 17:47:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg(r0, &(0x7f0000000800)={&(0x7f00000000c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x18, 0x0, 0x37, 'v'}], 0x18}, 0x0) [ 199.585766][ T9392] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.616934][ T9392] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.625425][ T9392] device bridge_slave_0 entered promiscuous mode [ 199.667447][ T9392] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.674616][ T9392] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.683444][ T9400] IPVS: ftp: loaded support on port[0] = 21 [ 199.690484][ T9392] device bridge_slave_1 entered promiscuous mode 17:47:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000000), 0x0}, 0x20) [ 199.786538][ T9395] chnl_net:caif_netlink_parms(): no params data found [ 199.799168][ T9392] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.837317][ T9392] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.885567][ T9392] team0: Port device team_slave_0 added [ 199.918943][ T9392] team0: Port device team_slave_1 added [ 200.065704][ T9392] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 200.079194][ T9407] IPVS: ftp: loaded support on port[0] = 21 [ 200.089571][ T9392] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:47:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000200)={'batadv_slave_1\x00', @ifru_data=0x0}) [ 200.117726][ T9392] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 200.144646][ T9395] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.153944][ T9395] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.166657][ T9395] device bridge_slave_0 entered promiscuous mode [ 200.182884][ T9392] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 200.208708][ T9392] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 200.256811][ T9392] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 200.274037][ T9395] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.281982][ T9395] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.290259][ T9395] device bridge_slave_1 entered promiscuous mode [ 200.309236][ T9400] chnl_net:caif_netlink_parms(): no params data found [ 200.370217][ T9410] IPVS: ftp: loaded support on port[0] = 21 [ 200.381332][ T9395] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 17:47:03 executing program 5: listen(0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, 0x0, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000002940)={r1, @in={{0x2, 0x4e22, @local}}, 0xcebd, 0xfff9}, &(0x7f0000002a00)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000002a40)={r2, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @broadcast}}}, 0x1f, 0x0, 0x0, 0x7fffffff, 0x8, 0x5}, &(0x7f0000002b00)=0x9c) r3 = socket(0x11, 0x3, 0x0) ioctl$SIOCSIFMTU(r3, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) r4 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r4, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r5 = socket(0x23, 0x2, 0x0) ioctl$SIOCSIFMTU(r5, 0x8914, &(0x7f0000000000)={'hsr0\x00', 0x5dd}) [ 200.448934][ T9392] device hsr_slave_0 entered promiscuous mode [ 200.497187][ T9392] device hsr_slave_1 entered promiscuous mode [ 200.575507][ T9395] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.636032][ T9395] team0: Port device team_slave_0 added [ 200.645726][ T9395] team0: Port device team_slave_1 added [ 200.685070][ T9412] IPVS: ftp: loaded support on port[0] = 21 [ 200.728727][ T9395] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 200.735690][ T9395] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 200.762304][ T9395] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 200.776353][ T9395] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 200.783348][ T9395] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 200.809271][ T9395] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 200.820564][ T9400] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.828097][ T9400] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.835880][ T9400] device bridge_slave_0 entered promiscuous mode [ 200.863677][ T9400] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.871166][ T9400] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.879042][ T9400] device bridge_slave_1 entered promiscuous mode [ 200.979156][ T9400] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.990559][ T9400] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.005280][ T9407] chnl_net:caif_netlink_parms(): no params data found [ 201.050189][ T9395] device hsr_slave_0 entered promiscuous mode [ 201.097205][ T9395] device hsr_slave_1 entered promiscuous mode [ 201.136995][ T9395] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 201.144965][ T9395] Cannot create hsr debugfs directory [ 201.270467][ T9400] team0: Port device team_slave_0 added [ 201.341341][ T9400] team0: Port device team_slave_1 added [ 201.383195][ T9407] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.391068][ T9407] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.400611][ T9407] device bridge_slave_0 entered promiscuous mode [ 201.408555][ T9412] chnl_net:caif_netlink_parms(): no params data found [ 201.450869][ T9407] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.458140][ T9407] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.465748][ T9407] device bridge_slave_1 entered promiscuous mode [ 201.477527][ T9400] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 201.484516][ T9400] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.511038][ T9400] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 201.522233][ T9392] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 201.582003][ T9392] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 201.676499][ T9400] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 201.684409][ T9400] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.711046][ T9400] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 201.734917][ T9392] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 201.791556][ T9392] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 201.850614][ T9407] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.887938][ T9407] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.918898][ T9410] chnl_net:caif_netlink_parms(): no params data found [ 201.935313][ T9407] team0: Port device team_slave_0 added [ 201.990251][ T9400] device hsr_slave_0 entered promiscuous mode [ 202.027337][ T9400] device hsr_slave_1 entered promiscuous mode [ 202.067015][ T9400] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 202.074587][ T9400] Cannot create hsr debugfs directory [ 202.111321][ T9407] team0: Port device team_slave_1 added [ 202.159104][ T9412] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.166242][ T9412] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.174949][ T9412] device bridge_slave_0 entered promiscuous mode [ 202.226229][ T9412] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.237194][ T9412] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.244896][ T9412] device bridge_slave_1 entered promiscuous mode [ 202.255844][ T9395] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 202.313363][ T9407] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 202.321399][ T9407] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 202.347387][ T9407] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 202.365797][ T9407] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 202.373096][ T9407] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 202.399384][ T9407] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 202.420019][ T9395] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 202.493181][ T9412] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 202.504561][ T9412] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 202.517457][ T9395] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 202.570235][ T9395] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 202.678301][ T9412] team0: Port device team_slave_0 added [ 202.697829][ T9412] team0: Port device team_slave_1 added [ 202.770350][ T9407] device hsr_slave_0 entered promiscuous mode [ 202.809244][ T9407] device hsr_slave_1 entered promiscuous mode [ 202.847781][ T9407] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 202.855355][ T9407] Cannot create hsr debugfs directory [ 202.861057][ T9410] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.868912][ T9410] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.877178][ T9410] device bridge_slave_0 entered promiscuous mode [ 202.888460][ T9410] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.895530][ T9410] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.903705][ T9410] device bridge_slave_1 entered promiscuous mode [ 202.934578][ T9410] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 202.951903][ T9410] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 202.989918][ T9412] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 202.997638][ T9412] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.023787][ T9412] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 203.041974][ T9412] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 203.049160][ T9412] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.075048][ T9412] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 203.106595][ T9410] team0: Port device team_slave_0 added [ 203.131957][ T9410] team0: Port device team_slave_1 added [ 203.174933][ T9400] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 203.220885][ T9400] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 203.285769][ T9400] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 203.346863][ T9410] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 203.353833][ T9410] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.380561][ T9410] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 203.393240][ T9410] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 203.400539][ T9410] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.426993][ T9410] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 203.490353][ T9412] device hsr_slave_0 entered promiscuous mode [ 203.537827][ T9412] device hsr_slave_1 entered promiscuous mode [ 203.586902][ T9412] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 203.594469][ T9412] Cannot create hsr debugfs directory [ 203.600578][ T9400] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 203.740600][ T9410] device hsr_slave_0 entered promiscuous mode [ 203.788316][ T9410] device hsr_slave_1 entered promiscuous mode [ 203.837019][ T9410] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 203.844758][ T9410] Cannot create hsr debugfs directory [ 203.856219][ T9392] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.980010][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.989437][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.007798][ T9392] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.038502][ T9407] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 204.125253][ T9407] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 204.169742][ T9407] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 204.220461][ T9407] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 204.279423][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.289048][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.298071][ T2803] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.305180][ T2803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.367655][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.402096][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.413760][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.422772][ T2975] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.429985][ T2975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.438441][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.447113][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.508053][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.518424][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.527683][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 204.540455][ T9410] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 204.612046][ T9410] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 204.676629][ T9410] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 204.734692][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.746006][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.758936][ T9410] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 204.799964][ T9412] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 204.859840][ T9412] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 204.936564][ T9400] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.944139][ T9412] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 205.000311][ T9412] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 205.069383][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.078061][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.090199][ T9395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.124140][ T9392] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 205.141469][ T9392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.164675][ T9400] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.172838][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.182221][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.191089][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.201383][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.209428][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.217586][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.248543][ T9395] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.272837][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.282005][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.290900][ T2805] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.298005][ T2805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.305584][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.314913][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 205.322501][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.331013][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.339791][ T2805] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.346904][ T2805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.357799][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.365693][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.419033][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.430518][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.439879][ T2803] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.446974][ T2803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.454718][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.463957][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.472355][ T2803] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.479415][ T2803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.487049][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.495511][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.504478][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.513219][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.521928][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.541132][ T9392] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.564491][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.573097][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.594256][ T9407] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.637513][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.648632][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.658319][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.667468][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.675720][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.684404][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.693639][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.702390][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.710678][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.719088][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.727822][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.749190][ T9395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.770580][ T9410] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.777774][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.786071][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.799076][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.806647][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.825030][ T9400] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 205.838983][ T9400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.864279][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.872775][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.881219][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 205.890760][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.901532][ T9407] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.933941][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.945298][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 205.971397][ T9410] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.991239][ T9400] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.000243][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.010981][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.019242][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.028582][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.037352][ T2984] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.044407][ T2984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.052368][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 206.059961][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 206.074695][ T9395] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.091149][ T9392] device veth0_vlan entered promiscuous mode [ 206.104572][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.113143][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.123867][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.133210][ T2975] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.140293][ T2975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.148717][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.156958][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.165275][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.174211][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.182984][ T2975] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.190066][ T2975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.230900][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.239239][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.253761][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.261432][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.271387][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.279920][ T2903] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.287028][ T2903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.294854][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 206.303489][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.312117][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.321136][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.329987][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.352061][ T9412] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.372563][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.381995][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.389879][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.409932][ T9400] device veth0_vlan entered promiscuous mode [ 206.418280][ T9392] device veth1_vlan entered promiscuous mode [ 206.438336][ T9412] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.445585][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.454724][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.463283][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.472512][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.481020][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.490776][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.502038][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.510127][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.518360][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 206.526017][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 206.536884][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.545455][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.557042][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 206.565669][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.608690][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.617584][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.625862][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.637027][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.645294][ T2984] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.654305][ T2984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.662548][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.671611][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.680279][ T2984] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.687400][ T2984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.694888][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.703267][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.711418][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.720334][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.744543][ T9400] device veth1_vlan entered promiscuous mode [ 206.756022][ T9392] device veth0_macvtap entered promiscuous mode [ 206.779456][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 206.790346][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.802267][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 206.815838][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.824354][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.833039][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.842094][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.850646][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.868742][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.879975][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.889029][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.897919][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.906399][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.914480][ T2984] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.926513][ T9392] device veth1_macvtap entered promiscuous mode [ 206.941277][ T9395] device veth0_vlan entered promiscuous mode [ 206.949832][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.960975][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.981664][ T9407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 206.992983][ T9410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.031717][ T9392] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 207.039666][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 207.049079][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.057948][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.066185][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.074742][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.083031][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.091801][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.101523][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 207.110497][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 207.120391][ T9395] device veth1_vlan entered promiscuous mode [ 207.153084][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 207.161556][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.169603][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 207.178896][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 207.187508][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.195671][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.216349][ T9407] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 207.234305][ T9400] device veth0_macvtap entered promiscuous mode [ 207.246313][ T9392] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 207.262359][ T9412] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.270051][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 207.279527][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 207.287650][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.295013][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 207.303648][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 207.329986][ T9400] device veth1_macvtap entered promiscuous mode [ 207.354703][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 207.365267][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.376100][ T9410] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 207.416758][ T9395] device veth0_macvtap entered promiscuous mode [ 207.440546][ T9400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.453424][ T9400] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.465217][ T9400] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 207.477399][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 207.485875][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 207.498001][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 207.505457][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.515568][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 207.524918][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 207.534820][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 207.543510][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 207.552436][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 207.622209][ T9395] device veth1_macvtap entered promiscuous mode [ 207.637835][ T9400] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 207.654542][ T9400] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.665863][ T9400] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 207.697518][ T9412] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 207.720901][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 207.730698][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 207.740065][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 207.861657][ T9395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.879068][ T9395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.897020][ T9395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.910418][ T9395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.921753][ T9395] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 207.934668][ T9395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 207.949845][ T9395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.960814][ T9395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 207.973582][ T9395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.985742][ T9395] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 208.132003][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 208.140854][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 208.149977][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.158661][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.168334][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 208.177237][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 208.185791][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 208.194477][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.203245][ T9407] device veth0_vlan entered promiscuous mode [ 208.230232][ T9407] device veth1_vlan entered promiscuous mode 17:47:11 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r3, @ANYBLOB="000020000000000024001200140001006272696467655f736c617665000000000c000500080005"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 208.257888][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.265695][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.298061][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 208.378732][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 208.403249][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 17:47:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002e000000e8bd6efb250009000e000200400000ff050005001201", 0x2e}], 0x1}, 0x0) [ 208.471931][ T9449] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 208.594887][ T9410] device veth0_vlan entered promiscuous mode [ 208.629953][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.640267][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.653138][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.662258][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.675216][ T9412] device veth0_vlan entered promiscuous mode [ 208.752083][ T9410] device veth1_vlan entered promiscuous mode [ 208.782806][ T9455] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 17:47:12 executing program 2: mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x20cc9a25ee9a25ba, 0xffffffffffffffff, 0x0) 17:47:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") syz_emit_ethernet(0x1c6, &(0x7f0000000180)={@local, @dev, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "90cbd6", 0x190, 0x21, 0x0, @local, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, @routing={0x87, 0x12, 0x0, 0x0, 0x0, [@empty, @ipv4={[], [], @broadcast}, @loopback, @mcast1, @local, @mcast1, @rand_addr="24d7ceb175ec825894cea8481b351ccb", @mcast1, @local]}, @dstopts={0x0, 0x0, [], [@pad1]}], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d50076", 0x0, "c1bbd4"}, "c546329d0f3d8a871e5ec54bfb726ac3ec1699b236928b65117aa98e98990a0d2c2c94379e1223790afe4df6be81ecb14dec47059ce5211abb23f01befd85d6253e2b8b3240d6c4b524d6839a46846896f5b0fd6fecc7d713e448d4711aa4aba81401d82804a15d00b3fd8a4624ee0946ab320fb97d0286cdc687891300addcccab9df85aa8a28b2a3077a3dd45427db5bd2582db068dc2a46aefaafed6fd7a7b73be52ba3bc02497a77c6e52844602aa27365f86467a0ecd9ac2c300029d1fb7b0344bf54825d12e1390ea3eb090cfc"}}}}}}, 0x0) 17:47:12 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x80, 0x4) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f0000000800)=0x8, 0x4) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000040)=0x80, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f0000000080)=0x80, 0x4) r4 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) bind$xdp(r3, &(0x7f0000000300)={0x2c, 0x0, r5}, 0x10) bind$xdp(r0, &(0x7f0000000000)={0x2c, 0x1, r2, 0x0, r3}, 0x10) [ 208.855999][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.866687][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.907080][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.923619][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.947484][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 208.967308][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 208.975746][ T2903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 208.980299][ T9465] dccp_v6_rcv: dropped packet with invalid checksum [ 209.001751][ T9412] device veth1_vlan entered promiscuous mode [ 209.074743][ T9407] device veth0_macvtap entered promiscuous mode [ 209.088337][ T9465] dccp_v6_rcv: dropped packet with invalid checksum 17:47:12 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, &(0x7f0000000280)={0x18, 0x2, {0x0, @remote}}, 0x1e) [ 209.134385][ T9407] device veth1_macvtap entered promiscuous mode 17:47:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e4800002a000505d25a80648c63940d0224fc60100007400a000000053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1f}, 0x60000) [ 209.180955][ T9410] device veth0_macvtap entered promiscuous mode [ 209.225512][ T9407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 209.285545][ T9407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.310759][ T9475] netlink: 'syz-executor.2': attribute type 7 has an invalid length. [ 209.315400][ T9407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 209.319420][ T9475] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 209.344565][ T9407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.353242][ T9475] netlink: 16638 bytes leftover after parsing attributes in process `syz-executor.2'. [ 209.360238][ T9407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 209.375194][ T9407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.393277][ T9407] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 209.402896][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 209.427510][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 209.435644][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 209.470186][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 209.478868][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.490286][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 209.498976][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 209.510070][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.518694][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.535027][ T9410] device veth1_macvtap entered promiscuous mode [ 209.550940][ T9407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 209.563366][ T9407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.573697][ T9407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 209.588215][ T9407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.599720][ T9407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 209.610935][ T9407] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:47:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x3a, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:47:13 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000}, 0x20b) [ 209.622649][ T9407] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 209.630156][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 209.638670][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 209.647434][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.721734][ T9410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 209.735245][ T9410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.753463][ T9410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 209.764018][ T9410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.775946][ T9410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 209.786459][ T9410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.796345][ T9410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 209.807666][ T9410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.820617][ T9410] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 209.843149][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.863463][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.872713][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 209.881427][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 209.893373][ T9412] device veth0_macvtap entered promiscuous mode [ 209.923072][ T9410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 209.949003][ T9410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 209.982304][ T9410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 209.993360][ T9410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.003568][ T9410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 210.014895][ T9410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.025336][ T9410] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 210.035782][ T9410] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.047536][ T9410] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 210.095736][ T9412] device veth1_macvtap entered promiscuous mode [ 210.104368][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 210.112606][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 210.120604][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 210.129498][ T2806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 210.425333][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 210.443377][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.454056][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 210.470474][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.481871][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 210.493321][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.503230][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 210.513863][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.524126][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 210.534902][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.547891][ T9412] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 210.558430][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 210.568911][ T2975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 210.590936][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 210.616234][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:47:13 executing program 3: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) connect$caif(r0, 0x0, 0x0) [ 210.632225][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 210.643069][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.684455][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 210.695444][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.706028][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 210.716607][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:47:14 executing program 4: r0 = socket(0x1, 0x5, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 210.726542][ T9412] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 210.737262][ T9412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 210.749440][ T9412] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 210.757057][ T9493] batadv_slave_1: mtu less than device minimum [ 210.761757][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 210.772883][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 211.174660][ T9504] device hsr0 entered promiscuous mode [ 211.182318][ T9504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:47:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x3, 0x3, 0x0, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0x14}}]}, 0x20}}, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b1a, &(0x7f0000000040)) 17:47:14 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, &(0x7f0000000280)={0x18, 0x2, {0x0, @remote}}, 0x1e) 17:47:14 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000333f88)={0x2, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2}]}, 0x20}}, 0x0) 17:47:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x3a, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:47:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x6846de70341668c9) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x5, &(0x7f0000000380)=[{&(0x7f0000000400)=""/199, 0xfffffe80}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000340)=""/42, 0x2a}], 0x2, 0x0, 0x181, 0x200f00}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0xf43185f1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 17:47:14 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@rdma_map={0x28, 0x114, 0x3, {{&(0x7f0000000040)=""/253, 0x23c}, &(0x7f0000000140)}}], 0x30}, 0x0) 17:47:14 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@rdma_map={0x28, 0x114, 0x3, {{&(0x7f0000000040)=""/253, 0x23c}, &(0x7f0000000140)}}], 0x30}, 0x0) 17:47:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x3a, &(0x7f0000000e40), 0x2}], 0x8d9, 0x0) 17:47:14 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@rdma_map={0x28, 0x114, 0x3, {{&(0x7f0000000040)=""/253, 0x23c}, &(0x7f0000000140)}}], 0x30}, 0x0) 17:47:14 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, &(0x7f0000000280)={0x18, 0x2, {0x0, @remote}}, 0x1e) 17:47:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf200000000000001500000008ffffffbd0301000000000095002000000000006916000000000000bf6700000000000017060000b964b0fd4506feff00200000540600000ee60000bf050000000000000f6500000000000065070000020000002c030000000000001f75000000000000bf54000000000000070000000400f9ffad430100000000007c000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c27dfef618ecf264e0f84f9f17d3c30e3c7bdd2d17f2f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703d6c4f633a9a4f16d0a3e127bee45a0100000fe9de56c9d8a814261bdb94a05000000c6c60bef0d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5af65727546e7c955ccefa1f6ab689fde4de4e63ede202fa4e0a2127b8b83c71a51445dc8da39e5b0ab7bcb8f512036a5ba6d04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb735fd552bdc268694aeb0743e326c819b6cf5c8ac86f8a297dff0445a13d0045fb3cda32a673a6bb55d8c85f21dce431e56723888fb126a163f16fb2ad9bc1172b84b3ebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67a993716dbf580469f0f53acbb400001e3738270b315d362ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154bcb4000000000000000000000000000000bc3af2b170ad3e2b268f4ddc211bc3ebf0bd9d42ca019dd5d022cf74686e9fbe2562979eaed840a7afaab43176e65ec1118d46d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7eab04871bc47287cd31cc43ea0ffb567b40407d000000000000000000000000005f37d83f84e98a523d80bd56a57fa82b82f639601ae899a53f6715a0a62a29ab028acfc1cb26a0f6a5480a55d638a0c544ba0dc828c22fe30000008000000000000000000000000000437d57fcf8295f63a70837f5cd4e5e77964522dc7ca3aa3476b7f2d851d27fd4de6eabb43e0799dc8d9fb7dc6c523ffbd74a6a40e4acb1ac693a27051f2ab759b8dbe8439db2a0426c7e7c0032028c95b29b6ddb551176693a921c76beceff7e4fbfea5011af0a99fa077ffe70cac8b9e44023a1749eb1d0d572b77d6e0d0fcd74035c7a1eb6eb4e1c8ef2629f5ecff4626746d6abe98a255e92c3c4f79bfcd0d9174138c820cfeb73dec68ed56b5d3dfd1c13f0cb8b71ad79000000000000000000000000000000dd434a25e95d0ec29d3adaccf89d0888031ecdfdb4dfbe444673be099ece7e4009c76c716d906fbc3c9b412e0478cfee4485f423c63f49db43833c92eeeb7bcc874b0993a2c0d3449de0616ceb647eebd4d7a93a17bcbb6bae5ff876375d4f18ca372104772a3a35ecedd97fc1a4802c3514c3d92ec9f9f3262cb13f4a2575fbe943a6c4"], &(0x7f0000000100)='GPL\x00'}, 0x48) 17:47:15 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@rdma_map={0x28, 0x114, 0x3, {{&(0x7f0000000040)=""/253, 0x23c}, &(0x7f0000000140)}}], 0x30}, 0x0) 17:47:15 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@rdma_map={0x28, 0x114, 0x3, {{&(0x7f0000000040)=""/253, 0x23c}, &(0x7f0000000140)}}], 0x30}, 0x0) 17:47:15 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, &(0x7f0000000280)={0x18, 0x2, {0x0, @remote}}, 0x1e) 17:47:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xe}]}}, &(0x7f0000000200)=""/4112, 0x26, 0x1010, 0x8}, 0x20) 17:47:15 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@rdma_map={0x28, 0x114, 0x3, {{&(0x7f0000000040)=""/253, 0x23c}, &(0x7f0000000140)}}], 0x30}, 0x0) [ 212.070292][ T9553] BPF:[1] VAR (anon) [ 212.085471][ T9553] BPF: [ 212.102590][ T9553] BPF:meta_left:0 meta_needed:4 [ 212.144852][ T9553] BPF: [ 212.144852][ T9553] 17:47:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0xf0, r5, {}, {}, {0x0, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0xc, 0x2, [@TCA_TCINDEX_HASH={0x8, 0x1, 0x8c9b}]}}]}, 0x3c}}, 0x0) 17:47:15 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@rdma_map={0x28, 0x114, 0x3, {{&(0x7f0000000040)=""/253, 0x23c}, &(0x7f0000000140)}}], 0x30}, 0x0) 17:47:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 17:47:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4, [{0x0, 0x2}]}]}}, &(0x7f0000004600)=""/210, 0x4a, 0xd2, 0x8}, 0x20) 17:47:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x6846de70341668c9) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x5, &(0x7f0000000380)=[{&(0x7f0000000400)=""/199, 0xfffffe80}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000340)=""/42, 0x2a}], 0x2, 0x0, 0x181, 0x200f00}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0xf43185f1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 17:47:15 executing program 1: syz_emit_ethernet(0xbe, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, {0x0, 0x4e22, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "65169eef8a654f406df2480ad1dd43b166515dde567d266aec82f568a564d48c", "7cac8cab63a3c5a002a876f37689031cffea441ce8ab408afb21156f17fcc9ec7f7c01bb48374886022e71ab237ccf85", "901de3c7c3536243bb4db5380d2644ec70897cf51dbbd45af5d2acc2", {"30166ef85def0f3d21fc07ea7b1c2dd8", "ee936e6d66c52201dbc778077d07e8db"}}}}}}}, 0x0) 17:47:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000000)='v', 0x1}], 0x1, 0x800) write$cgroup_int(r2, &(0x7f0000000200), 0xfdef) ioctl$FITRIM(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x8001, 0xf4d3}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$cgroup_int(r0, &(0x7f0000000200), 0x43400) 17:47:15 executing program 1: syz_emit_ethernet(0xbe, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, {0x0, 0x4e22, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "65169eef8a654f406df2480ad1dd43b166515dde567d266aec82f568a564d48c", "7cac8cab63a3c5a002a876f37689031cffea441ce8ab408afb21156f17fcc9ec7f7c01bb48374886022e71ab237ccf85", "901de3c7c3536243bb4db5380d2644ec70897cf51dbbd45af5d2acc2", {"30166ef85def0f3d21fc07ea7b1c2dd8", "ee936e6d66c52201dbc778077d07e8db"}}}}}}}, 0x0) 17:47:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0xf0, r5, {}, {}, {0x0, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0xc, 0x2, [@TCA_TCINDEX_HASH={0x8, 0x1, 0x8c9b}]}}]}, 0x3c}}, 0x0) 17:47:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x2343a726) gettid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e", 0x36, 0x11, 0x0, 0x0) socket$inet(0x2b, 0x1, 0x0) socket$inet(0x2b, 0x1, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) connect(0xffffffffffffffff, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x2, @rand_addr=0x7}}, 0x80) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0xfffffffd}, 0x10) socket(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) accept4$x25(0xffffffffffffffff, &(0x7f0000002840)={0x9, @remote}, 0x0, 0x100000) socket(0x1e, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) 17:47:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0xf0, r5, {}, {}, {0x0, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0xc, 0x2, [@TCA_TCINDEX_HASH={0x8, 0x1, 0x8c9b}]}}]}, 0x3c}}, 0x0) 17:47:16 executing program 1: syz_emit_ethernet(0xbe, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, {0x0, 0x4e22, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "65169eef8a654f406df2480ad1dd43b166515dde567d266aec82f568a564d48c", "7cac8cab63a3c5a002a876f37689031cffea441ce8ab408afb21156f17fcc9ec7f7c01bb48374886022e71ab237ccf85", "901de3c7c3536243bb4db5380d2644ec70897cf51dbbd45af5d2acc2", {"30166ef85def0f3d21fc07ea7b1c2dd8", "ee936e6d66c52201dbc778077d07e8db"}}}}}}}, 0x0) 17:47:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf200000000000001500000008ffffffbd0301000000000095002000000000006916000000000000bf6700000000000017060000b964b0fd4506feff00200000540600000ee60000bf050000000000000f6500000000000065070000020000002c030000000000001f75000000000000bf54000000000000070000000400f9ffad430100000000007c000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c27dfef618ecf264e0f84f9f17d3c30e3c7bdd2d17f2f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703d6c4f633a9a4f16d0a3e127bee45a0100000fe9de56c9d8a814261bdb94a05000000c6c60bef0d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5af65727546e7c955ccefa1f6ab689fde4de4e63ede202fa4e0a2127b8b83c71a51445dc8da39e5b0ab7bcb8f512036a5ba6d04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb735fd552bdc268694aeb0743e326c819b6cf5c8ac86f8a297dff0445a13d0045fb3cda32a673a6bb55d8c85f21dce431e56723888fb126a163f16fb2ad9bc1172b84b3ebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67a993716dbf580469f0f53acbb400001e3738270b315d362ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154bcb4000000000000000000000000000000bc3af2b170ad3e2b268f4ddc211bc3ebf0bd9d42ca019dd5d022cf74686e9fbe2562979eaed840a7afaab43176e65ec1118d46d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7eab04871bc47287cd31cc43ea0ffb567b40407d000000000000000000000000005f37d83f84e98a523d80bd56a57fa82b82f639601ae899a53f6715a0a62a29ab028acfc1cb26a0f6a5480a55d638a0c544ba0dc828c22fe30000008000000000000000000000000000437d57fcf8295f63a70837f5cd4e5e77964522dc7ca3aa3476b7f2d851d27fd4de6eabb43e0799dc8d9fb7dc6c523ffbd74a6a40e4acb1ac693a27051f2ab759b8dbe8439db2a0426c7e7c0032028c95b29b6ddb551176693a921c76beceff7e4fbfea5011af0a99fa077ffe70cac8b9e44023a1749eb1d0d572b77d6e0d0fcd74035c7a1eb6eb4e1c8ef2629f5ecff4626746d6abe98a255e92c3c4f79bfcd0d9174138c820cfeb73dec68ed56b5d3dfd1c13f0cb8b71ad79000000000000000000000000000000dd434a25e95d0ec29d3adaccf89d0888031ecdfdb4dfbe444673be099ece7e4009c76c716d906fbc3c9b412e0478cfee4485f423c63f49db43833c92eeeb7bcc874b0993a2c0d3449de0616ceb647eebd4d7a93a17bcbb6bae5ff876375d4f18ca372104772a3a35ecedd97fc1a4802c3514c3d92ec9f9f3262cb13f4a2575fbe943a6c4"], &(0x7f0000000100)='GPL\x00'}, 0x48) 17:47:16 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000000)='v', 0x1}], 0x1, 0x800) write$cgroup_int(r2, &(0x7f0000000200), 0xfdef) ioctl$FITRIM(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x8001, 0xf4d3}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$cgroup_int(r0, &(0x7f0000000200), 0x43400) 17:47:16 executing program 1: syz_emit_ethernet(0xbe, &(0x7f0000000200)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, {0x0, 0x4e22, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "65169eef8a654f406df2480ad1dd43b166515dde567d266aec82f568a564d48c", "7cac8cab63a3c5a002a876f37689031cffea441ce8ab408afb21156f17fcc9ec7f7c01bb48374886022e71ab237ccf85", "901de3c7c3536243bb4db5380d2644ec70897cf51dbbd45af5d2acc2", {"30166ef85def0f3d21fc07ea7b1c2dd8", "ee936e6d66c52201dbc778077d07e8db"}}}}}}}, 0x0) 17:47:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x4, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0xf0, r5, {}, {}, {0x0, 0xfff1}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0xc, 0x2, [@TCA_TCINDEX_HASH={0x8, 0x1, 0x8c9b}]}}]}, 0x3c}}, 0x0) 17:47:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x6846de70341668c9) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x5, &(0x7f0000000380)=[{&(0x7f0000000400)=""/199, 0xfffffe80}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000340)=""/42, 0x2a}], 0x2, 0x0, 0x181, 0x200f00}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0xf43185f1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 17:47:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000000)='v', 0x1}], 0x1, 0x800) write$cgroup_int(r2, &(0x7f0000000200), 0xfdef) ioctl$FITRIM(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x8001, 0xf4d3}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$cgroup_int(r0, &(0x7f0000000200), 0x43400) 17:47:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 17:47:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000100)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00', 0x3d1) sendmmsg$inet(r0, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000780)="829ac282abafdf531c8c6e9527d0d2237bc27334fa6fd6b9019e5e4d84d4b55fc5f56ae4155809d214f848cbc34d69a61be7e0e192188a0c8c3667845ca8297af3911a0557e7c8f25bd05328c59a7dfbeb5e"}, {&(0x7f0000001100)="ec2c5c945ec861d9283d5dc1fb0a1a8615ad10defcce7b52fa7001b982854b131317f21b3309617773596823e40c69a791be38427c"}, {&(0x7f0000001140)="bea54d7e8a12fbdca62b1c36bd3366414bd19fbfa50a23882f3e3b76358bc16e47236b3d3039a754e23c0d251b32d8181cdf8f5227234b9b2fba4186ae168cdc31255c2d2fbc967cc584b9efec6aa7b25205ced06f03aca1748263d0f6da4348c4a7ab253eb570098ef4ba774e7996fd7ef0d2ea814eb90041b8736eb1c354fc05d3"}, {&(0x7f0000001200)="dea38c6f6b97a20addba2f76cad92c9253107e6e5d55a527da404535a9bf35f47ffb08caa5bb267f25a830c62c0a92bd0e060a4cd9672372d63fa36573aee5190e2009beee06f6daece08c9424caff6a3b05438ebdd4a86284ced054c76c6d2ec834b266d70f73fa704c74022ee5220c8666fe04c15020d3f88e0dc9477fc78993e21e5864f26cf9a5b2286dc7da26c6ff238f336fc0fb846d065a3bce2b20361ad360c47074864f187492bb134cea1ea7232ff50d6b931d72199ebdde72fb55e76b17d9188ad61b2f72adc664f2ac536a2bb9c400026abc810d4abd9e703a3b000d840b24a6b87c295c50f0c169c508eada0a06"}, {&(0x7f0000001300)="ed92aef9"}, {&(0x7f0000001340)="4b86eb2d6a54028395a2bac27ce8ee3465b41bed8a7967c4c604093f594759ed45b0ade0cbbfe834feeb4104427c9343477cbd889bfde24c26eda9c9f75542a47e1c599e580b78d7a61765f535f9b7f648a89bb9cfe9110a92656f13b15eb7a08d739e36751a47be7207af09a285b48d61d712dd8dbc38ec07bc"}, {&(0x7f00000013c0)="dda949cc02ee197f89114d868857553736443a11e18febcae74abfc3c0226b4da569b3398231350fbb90031ec3e5472e97988f272b50a1e80dd54e7154cb6a6e02bdcdce706aba3746e7289f9d7fea8cf826025708be8ffdd6125a07308fb2305214e37dbf4e47d2e4e137c09d22c3591c5c5d16455e883dc3469bdb443d97a4745bff99ffb03ebd47143af237c6aacbd83321a26ed1865d25"}, {&(0x7f0000001480)="ac2e97f3a2441c63214b98b20e3256b130acbc925f16295d485c4e554d22b82ad82f8ac8ea27b981fdecc6168fb7599b9f"}], 0x1}}, {{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000800)="e4", 0x1}, {&(0x7f00000006c0)="5fdff2c49196270ee6edf7582e61ff629fca3aac62edd87adf5a632df146185d341244a20b90c97bd1351cfbb058f03a7b061adb22d1d84e29ab57cc49a3d600"/75, 0x42}, {&(0x7f0000000240)="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", 0xff}, {&(0x7f0000000840)="d814fc2862d7b25767775976a6bebe28387e73486ebe8f930000000000000009ec0e91bc8e508b93f56ce2bc9d22cebf46d52227515afb0cad770eb12583dc319caf85277bb2e5022278b80d380050b074261e46e615837a0778b20e3f55b9eec9fbb3aab11a721d27f99c4aeb18a656aae4d9c04d2470be0eab87c69d73d9122324bf14fc2535a036e81d6a15d5e0ef7f89b57c66fa21638d2f3fddc26013be0ee8c4912bfa2fd17567a76d250d681b27cdd4da1ac7ed5e307322c7ba2ec4fb761b090a861447a2d5da629ed828d4c978505cfff2a69cdc9e835a45af223bfbe0c5c1529087e8e2f85a82be19e928846b49094380f375ea44cd4eb97675b75c9ccd8c6bdba9bcf5b7476a1e0866e67ec7f43d82876f742873d929ed422760d770a4e57977be2b60a434e7c2fb5605859abd43aeb83feb48ebe6a75dc2b8fe30911e244cd3a82744b084cc87b18070fdea6b2fadb913a7e0be77cd0441d681038eb6f44e24028b3d8f1a94a94532853bafe52c24b4dc576c0322944c440a84caee7080b1ea31fd569b208ed76f84c60c8b6f5904065e4b14782392b6eb93b3a8b681310e12036d9150b82f37ced650f61b014ab42b6c1fce9a95b785ebc057c7aab197edd1d0f0ef0b178f2c23bb823367547ec189ce1f2dac02cf7d5833f0adeb4d444b9f0fd3a646ad373c0c75dc7fc5d78761299bd578881f8447593d971c13a654db36aecca4b9f8f53e5ed9cd13b26cf22f6c0cceb4768e0cbde146b16f42cd92dc00d8634e56e5f3750cc5255342032815075a22c0cdb4e3a7f35b4294b6f88793b24342dfd24094cae83992d6458e46862385008fbb09fb73456fa8a87c5db39d6b49a7ea3e720c927640cc458ea400c1326b4a8bfa0d73de1e0150714a41a2bb75406f4cd8e5de326f12caca9f1198d10ce53daacda9d2b45a4cb563bb1196d5b6eb606d8c3030cab63c4428ced5c71723957d740a02c66f8c87c519f1cfabfcce9d8947c737dfa39d921701ab8471e411428ffe9a92dd2d9ffdcda65727687be6bf6f5516ca6de45338237037a0c9aa45d0ce725f858bf99c1f33ea688969b35c586c4be02f8caa55c259bee9e8806fa2240cfd18dbc0b06c22d4432ebc777843b3aea38ed82de4e5b5102ac09fcc85829cb502d1b12aa29848c106190356b99cf03d1b1b4f72fd901be0adddc03b0886272d87ad20fa0b40a0962ea3d2f92230df7ab8d6262703d92cee709db9e03a0ce0721ac3685f4ebad7183dea741e77805eccefc0e1cf6f352486eb2e8def5afb60885b328042a0ea6d435be8c35d6b79332aed2e9a318334cb4aa0ceeabe50e95ecb1fe45a3572a1383fd3dec223eb1aafd30d8f9eab0ba112c374fe1ef360d8250a8d695c8424ad225c06722c355c150f992b1e296a4db166095815b12b6fd931d4e779a881587807e0d9f168aedbadb353c31805bd59d0ec154febb23d941f7b2607e097b5776aac89036f81d5523f92131814a807e36bee553b98ad7e014763e15ba55d568517d663fb7704ea6c955542fcaf08ed361774c887dda1657f557268c53aa097cb3b2738f454329b72b753cce67fa35f58e40db3489b9501662ffe94f146e2e309498b9b303e3095e0136f2ec800b7de6c14df2b5a40138925d2a31e99a3a488c3ca77b83de3b620a19df179c2e5f7290d76f3dd74c6fe81882a9990490a91f1edabb26e7ecd77de845657643acd1a037cc90df2830db5a0da68a04871e272478ef33778ecfc170afd414253b966d5f1ddc59a67c9c569ac87e25a3a9f6118a9733894bc2fafafb97fd1712b275dc5df744ae19605071e97af0c32a9c2ee3ec03b530a82ae3588e166e695cf91adaaf2d5a7e13895ad62012864c0b6b8f8261242aabd3a469a9b41af304b08b518823a028a564b5f30114654c1d7c1bd48f5c64aec8d94e621dcd4a13e96c451e5c13f53cb7ab851e205120e451adda223ca73c6c9be59b55ccf0bb5187dc972ff7a2b5976b4d6e5445e96cc251510be3ae815a219deab2596fd1fbfa7c9cbc4ed7c96d28bcb70abe75be4527b616c31980c1f2de7a2e14e1180debc940a0bab0c72f140a783cbab6842955604b42353fbafea72b2ed93ddb29ba4fad5c929a3a463b5e879607ad3d5c0757677756c40e80006741290e50798af27fc7041265a84bb4d1b1470d48f0e72d2a599804438b7fb71eb165da40a032512f788313c362b4ac2e4e87566882061be3e7bf62efaafd61540870dea91aa5e8e700296949e32a0a86bbbb19e143802491c5de381cbce1e3f93d3776b9b4ae24fdb743cfec89de0ab3eb499169856a2b127e1d1a9dc658dc923bebad0f4ea8f831355a9fc39488121f9de9f22542c61b9774a6dc0c52108676271ea7c5dc3e6c31521987dd6f8da80e1dd41179f79c8989176fa96b24490dbeeb7987fb9467d5d4a8179f55e787bef2876723e118c4116bfd00438d4abc3515d5486ae26eb7bcbbb28a7d3bdf7a038ad3d2aa6d0c168bc46981309843f6caee0c2f5a403bd050af668f1375238120e7c67ef04ab0519385295008a31eb75a9f9ce83eea207ecf628fdfebb1253ba783af808e0b2c0a4007b98d0a31fa973d8b61b6062639f2b5eff81cfaf94cfa1b4dadaeed7affa56e571cb3c36f5b7db13e00078e04ec3f1811b8d890bde91ae938a74697c72bae2925b0e1efeec075e1bfe4937474c20370998bcb062578758637004f74f7e57ecb8e8d30b62f45f5bc4cbb718e5bcf06d11e9a55323d9475b0bf2b8bd49ac6e0a3b84ede355c6ccbf246d6e7127387b4e6ad7273a4b7b7484e4a76970ea62be588ba3645f1c1928ec42b8e7d0279ae197f62e3d9976374ed61dc7122b6cf3858248f1d038660da60c42518ce84f3ccde027641064d7f600d63f39ac33a08c5fa1588557d422d05e573ff51f483d152ce4d6cc5ca1ab97a4ddb6507c9a2e57e49d43fbdd2151b7c13d2d2a288be6934e659fd544c17448835e5b52169634382315a1d574ed109895d515c66ac0f66f5f225356b2f296bab104f72851d508eec096961b9bd2c2c2da0299a9e719748098ccd91a8c4a542a36ca420474afbf68addf76858eebab112e9c98ea7eee88fadce65cba7f68aa949407c67f7c562d1dbf398a6ecd261ff2f787efde6923", 0x8be}], 0x4}}, {{&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000340)="8423c1db9705cbcae913295549643ea088a2104c70d59dc683a36e119fb4ed59056a9c298f50f004", 0x28}, {&(0x7f0000000380)="8b93c36250a066e849f3fa58adc4df006284644bbdc2d5a13609d3fa3f8198ad", 0x20}, {&(0x7f00000003c0)="743a9eb7f72465d1c61136143cc416c3406e1ec4a7bda2109f38e762d5e77be9019eaab0314f0aedc5e3f457d332fe7044ce41cc54b69dcbf7943b45b2f065b7ed4c972886e7c821551f31fd2e9aa574c6a42c29408554c55ea70ecfd4daa1ae6e08da2f64b1667241b2836009e5dd94987144e109c3bcb74fed504b9a4ef9070917909c4973ed7feb253ce1f7b0d40ad52e89", 0x93}, {&(0x7f0000000480)="4cb1546b2d5f6502dfa1eba1272628b9c0dc17e59fd71f08cb846b267c050466063e047f1b8c63ce894d037edca9d858d0a74ccd26056f7a9f2e106ccd2998e0c262621b737ef8b03474205303e0b3f1ae392eb8c485ab51d4265e65afd6b5b0d23433b72858b4ea0835d84774109457c894de4eb0d3f4f9825a817775c83d3b40364ad8e3e8d14ccc297fe076ea87a12b2f85f856e7c6a4c1936c03bf48cb3de9cf9594815c20e933cc50253b6f22483b7eb1cd", 0xb4}], 0x4, &(0x7f0000000580)=[@ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}, @ip_ttl={{0x2}}, @ip_ttl={{0x14}}], 0x60}}], 0x3, 0x4040000) 17:47:16 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000000)='v', 0x1}], 0x1, 0x800) write$cgroup_int(r2, &(0x7f0000000200), 0xfdef) ioctl$FITRIM(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x8001, 0xf4d3}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$cgroup_int(r0, &(0x7f0000000200), 0x43400) [ 213.420399][ T9630] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:47:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000000)='v', 0x1}], 0x1, 0x800) write$cgroup_int(r2, &(0x7f0000000200), 0xfdef) ioctl$FITRIM(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x8001, 0xf4d3}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$cgroup_int(r0, &(0x7f0000000200), 0x43400) 17:47:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) accept(r1, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz1', "0568fe7f2c77269618d5c947734cbd065c43ade2cb00decb63d58208b63a0c05b2e8580411a87ef571bfb47849e5bf4529599bce558ba2c513e2f66ecda039e06acd66023a153356d4438f0371898c0b1609b6e8a75e7d96d175d80e5a29007af9d47cb037fe2e0e4feaa1b7cbbf2c6583a991f657b4aa89f97f93f7716191e2de68f9790148b090b744c75999893c00e4ff9b91b3d497c572acdb14eea1b2452ff639b7a9b0ac84f36642ea74c70c45d912b6d48158e75c72ff0fd924da0ae8bdaf445df56301ae"}, 0xcc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x60000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr="00000000000200"}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 17:47:17 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000000)='v', 0x1}], 0x1, 0x800) write$cgroup_int(r2, &(0x7f0000000200), 0xfdef) ioctl$FITRIM(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x8001, 0xf4d3}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$cgroup_int(r0, &(0x7f0000000200), 0x43400) 17:47:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x2343a726) gettid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e", 0x36, 0x11, 0x0, 0x0) socket$inet(0x2b, 0x1, 0x0) socket$inet(0x2b, 0x1, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) connect(0xffffffffffffffff, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x2, @rand_addr=0x7}}, 0x80) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0xfffffffd}, 0x10) socket(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) accept4$x25(0xffffffffffffffff, &(0x7f0000002840)={0x9, @remote}, 0x0, 0x100000) socket(0x1e, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) 17:47:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x3c}}, &(0x7f0000000000)='GPL\x00', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 17:47:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x3c}}, &(0x7f0000000000)='GPL\x00', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) [ 213.963100][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 214.083196][ T9679] [ 214.085556][ T9679] ============================================ [ 214.091701][ T9679] WARNING: possible recursive locking detected [ 214.097855][ T9679] 5.6.0-rc3-syzkaller #0 Not tainted [ 214.103136][ T9679] -------------------------------------------- [ 214.109283][ T9679] syz-executor.0/9679 is trying to acquire lock: [ 214.115597][ T9679] ffff8880974f8ed0 (sk_lock-AF_INET6){+.+.}, at: inet_csk_accept+0x69f/0xd30 [ 214.124360][ T9679] [ 214.124360][ T9679] but task is already holding lock: [ 214.131718][ T9679] ffff88805ada8dd0 (sk_lock-AF_INET6){+.+.}, at: inet_csk_accept+0x8d/0xd30 [ 214.140401][ T9679] [ 214.140401][ T9679] other info that might help us debug this: [ 214.148450][ T9679] Possible unsafe locking scenario: [ 214.148450][ T9679] [ 214.155889][ T9679] CPU0 [ 214.159164][ T9679] ---- [ 214.162440][ T9679] lock(sk_lock-AF_INET6); [ 214.166933][ T9679] lock(sk_lock-AF_INET6); [ 214.171452][ T9679] [ 214.171452][ T9679] *** DEADLOCK *** [ 214.171452][ T9679] [ 214.179593][ T9679] May be due to missing lock nesting notation [ 214.179593][ T9679] [ 214.187910][ T9679] 1 lock held by syz-executor.0/9679: [ 214.193267][ T9679] #0: ffff88805ada8dd0 (sk_lock-AF_INET6){+.+.}, at: inet_csk_accept+0x8d/0xd30 [ 214.202388][ T9679] [ 214.202388][ T9679] stack backtrace: [ 214.208275][ T9679] CPU: 1 PID: 9679 Comm: syz-executor.0 Not tainted 5.6.0-rc3-syzkaller #0 [ 214.216848][ T9679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.226894][ T9679] Call Trace: 17:47:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000015c0)=[{&(0x7f0000000000)='v', 0x1}], 0x1, 0x800) write$cgroup_int(r2, &(0x7f0000000200), 0xfdef) ioctl$FITRIM(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x8001, 0xf4d3}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$cgroup_int(r0, &(0x7f0000000200), 0x43400) [ 214.230185][ T9679] dump_stack+0x188/0x20d [ 214.234520][ T9679] __lock_acquire.cold+0x114/0x288 [ 214.239624][ T9679] ? find_held_lock+0x2d/0x110 [ 214.244381][ T9679] ? mark_held_locks+0xe0/0xe0 [ 214.249147][ T9679] ? inet_csk_accept+0x4e5/0xd30 [ 214.254090][ T9679] lock_acquire+0x197/0x420 [ 214.258595][ T9679] ? inet_csk_accept+0x69f/0xd30 [ 214.263539][ T9679] lock_sock_nested+0xc5/0x110 [ 214.268304][ T9679] ? inet_csk_accept+0x69f/0xd30 [ 214.273245][ T9679] inet_csk_accept+0x69f/0xd30 [ 214.278016][ T9679] ? percpu_counter_add_batch+0x50/0x180 [ 214.283654][ T9679] ? inet_csk_listen_stop+0xb20/0xb20 [ 214.289022][ T9679] ? aa_label_sk_perm+0x89/0xe0 [ 214.293869][ T9679] ? aa_sk_perm+0x319/0xab0 [ 214.298371][ T9679] inet_accept+0xe9/0x7c0 [ 214.302699][ T9679] ? ipv4_mib_exit_net+0x180/0x180 [ 214.307809][ T9679] ? __alloc_fd+0x46d/0x600 [ 214.312342][ T9679] ? ipv4_mib_exit_net+0x180/0x180 [ 214.317976][ T9679] __sys_accept4_file+0x3ac/0x5b0 [ 214.323005][ T9679] ? __ia32_sys_listen+0x70/0x70 [ 214.328062][ T9679] ? ksys_dup3+0x3c0/0x3c0 [ 214.332563][ T9679] __sys_accept4+0x53/0x90 [ 214.336981][ T9679] __x64_sys_accept4+0x93/0xf0 [ 214.341747][ T9679] ? lockdep_hardirqs_on+0x417/0x5d0 [ 214.347031][ T9679] do_syscall_64+0xf6/0x790 [ 214.351534][ T9679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.357424][ T9679] RIP: 0033:0x45c679 [ 214.361317][ T9679] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 214.380913][ T9679] RSP: 002b:00007f932a501c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 214.389317][ T9679] RAX: ffffffffffffffda RBX: 00007f932a5026d4 RCX: 000000000045c679 [ 214.397290][ T9679] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 214.405283][ T9679] RBP: 000000000076c040 R08: 0000000000000000 R09: 0000000000000000 [ 214.413248][ T9679] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 214.421213][ T9679] R13: 000000000000000b R14: 00000000004c2905 R15: 000000000076c04c 17:47:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x6846de70341668c9) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x5, &(0x7f0000000380)=[{&(0x7f0000000400)=""/199, 0xfffffe80}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000340)=""/42, 0x2a}], 0x2, 0x0, 0x181, 0x200f00}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0xf43185f1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 17:47:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x65}, [@call={0x47}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) 17:47:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x3c}}, &(0x7f0000000000)='GPL\x00', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 17:47:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f00000006c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000500)=""/135, 0x87}], 0x6}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r1 = socket(0x29, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0xff03) 17:47:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x3c}}, &(0x7f0000000000)='GPL\x00', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 17:47:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f00000006c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000500)=""/135, 0x87}], 0x6}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r1 = socket(0x29, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0xff03) 17:47:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) accept(r1, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz1', "0568fe7f2c77269618d5c947734cbd065c43ade2cb00decb63d58208b63a0c05b2e8580411a87ef571bfb47849e5bf4529599bce558ba2c513e2f66ecda039e06acd66023a153356d4438f0371898c0b1609b6e8a75e7d96d175d80e5a29007af9d47cb037fe2e0e4feaa1b7cbbf2c6583a991f657b4aa89f97f93f7716191e2de68f9790148b090b744c75999893c00e4ff9b91b3d497c572acdb14eea1b2452ff639b7a9b0ac84f36642ea74c70c45d912b6d48158e75c72ff0fd924da0ae8bdaf445df56301ae"}, 0xcc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x60000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr="00000000000200"}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 17:47:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 17:47:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x2343a726) gettid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e", 0x36, 0x11, 0x0, 0x0) socket$inet(0x2b, 0x1, 0x0) socket$inet(0x2b, 0x1, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) connect(0xffffffffffffffff, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x2, @rand_addr=0x7}}, 0x80) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0xfffffffd}, 0x10) socket(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) accept4$x25(0xffffffffffffffff, &(0x7f0000002840)={0x9, @remote}, 0x0, 0x100000) socket(0x1e, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) 17:47:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x200, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) socketpair(0x1d, 0xa, 0x80, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e23, 0x2, @remote, 0x9}}, 0x0, 0x8001}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={r2, 0x8}, 0x8) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) sendmmsg(r0, &(0x7f0000000440), 0x0, 0x20048861) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f00000002c0)='wireguard\x00') vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1) close(0xffffffffffffffff) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0x9, &(0x7f0000000340)={&(0x7f0000000680)=ANY=[@ANYBLOB="38b71000", @ANYRES16=r4, @ANYRESOCT], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20040002) 17:47:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f00000006c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000500)=""/135, 0x87}], 0x6}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r1 = socket(0x29, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0xff03) 17:47:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) accept(r1, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz1', "0568fe7f2c77269618d5c947734cbd065c43ade2cb00decb63d58208b63a0c05b2e8580411a87ef571bfb47849e5bf4529599bce558ba2c513e2f66ecda039e06acd66023a153356d4438f0371898c0b1609b6e8a75e7d96d175d80e5a29007af9d47cb037fe2e0e4feaa1b7cbbf2c6583a991f657b4aa89f97f93f7716191e2de68f9790148b090b744c75999893c00e4ff9b91b3d497c572acdb14eea1b2452ff639b7a9b0ac84f36642ea74c70c45d912b6d48158e75c72ff0fd924da0ae8bdaf445df56301ae"}, 0xcc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x60000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr="00000000000200"}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 215.136609][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 215.318868][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:47:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f00000006c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000500)=""/135, 0x87}], 0x6}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r1 = socket(0x29, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0xff03) 17:47:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) accept(r1, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz1', "0568fe7f2c77269618d5c947734cbd065c43ade2cb00decb63d58208b63a0c05b2e8580411a87ef571bfb47849e5bf4529599bce558ba2c513e2f66ecda039e06acd66023a153356d4438f0371898c0b1609b6e8a75e7d96d175d80e5a29007af9d47cb037fe2e0e4feaa1b7cbbf2c6583a991f657b4aa89f97f93f7716191e2de68f9790148b090b744c75999893c00e4ff9b91b3d497c572acdb14eea1b2452ff639b7a9b0ac84f36642ea74c70c45d912b6d48158e75c72ff0fd924da0ae8bdaf445df56301ae"}, 0xcc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x60000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr="00000000000200"}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 17:47:18 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x0) 17:47:19 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x0) [ 215.715453][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 215.753784][ T9762] syz-executor.1 (9762) used greatest stack depth: 21528 bytes left 17:47:19 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x0) 17:47:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x200, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) socketpair(0x1d, 0xa, 0x80, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e23, 0x2, @remote, 0x9}}, 0x0, 0x8001}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={r2, 0x8}, 0x8) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) sendmmsg(r0, &(0x7f0000000440), 0x0, 0x20048861) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f00000002c0)='wireguard\x00') vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1) close(0xffffffffffffffff) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0x9, &(0x7f0000000340)={&(0x7f0000000680)=ANY=[@ANYBLOB="38b71000", @ANYRES16=r4, @ANYRESOCT], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20040002) 17:47:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) accept(r1, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz1', "0568fe7f2c77269618d5c947734cbd065c43ade2cb00decb63d58208b63a0c05b2e8580411a87ef571bfb47849e5bf4529599bce558ba2c513e2f66ecda039e06acd66023a153356d4438f0371898c0b1609b6e8a75e7d96d175d80e5a29007af9d47cb037fe2e0e4feaa1b7cbbf2c6583a991f657b4aa89f97f93f7716191e2de68f9790148b090b744c75999893c00e4ff9b91b3d497c572acdb14eea1b2452ff639b7a9b0ac84f36642ea74c70c45d912b6d48158e75c72ff0fd924da0ae8bdaf445df56301ae"}, 0xcc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x60000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr="00000000000200"}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 17:47:19 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x0) [ 216.151830][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:47:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x2343a726) gettid() setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e", 0x36, 0x11, 0x0, 0x0) socket$inet(0x2b, 0x1, 0x0) socket$inet(0x2b, 0x1, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) connect(0xffffffffffffffff, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x2, @rand_addr=0x7}}, 0x80) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0xfffffffd}, 0x10) socket(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) accept4$x25(0xffffffffffffffff, &(0x7f0000002840)={0x9, @remote}, 0x0, 0x100000) socket(0x1e, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) 17:47:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) accept(r1, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz1', "0568fe7f2c77269618d5c947734cbd065c43ade2cb00decb63d58208b63a0c05b2e8580411a87ef571bfb47849e5bf4529599bce558ba2c513e2f66ecda039e06acd66023a153356d4438f0371898c0b1609b6e8a75e7d96d175d80e5a29007af9d47cb037fe2e0e4feaa1b7cbbf2c6583a991f657b4aa89f97f93f7716191e2de68f9790148b090b744c75999893c00e4ff9b91b3d497c572acdb14eea1b2452ff639b7a9b0ac84f36642ea74c70c45d912b6d48158e75c72ff0fd924da0ae8bdaf445df56301ae"}, 0xcc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x60000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr="00000000000200"}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 17:47:19 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = epoll_create1(0x0) r2 = socket(0x11, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000001c0)) [ 216.383093][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:47:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000505d20680648c63940d0424fc60040012400a001800053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 216.479728][ T9806] netlink: 'syz-executor.1': attribute type 8 has an invalid length. [ 216.493418][ T9806] netlink: 16638 bytes leftover after parsing attributes in process `syz-executor.1'. 17:47:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) accept(r1, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz1', "0568fe7f2c77269618d5c947734cbd065c43ade2cb00decb63d58208b63a0c05b2e8580411a87ef571bfb47849e5bf4529599bce558ba2c513e2f66ecda039e06acd66023a153356d4438f0371898c0b1609b6e8a75e7d96d175d80e5a29007af9d47cb037fe2e0e4feaa1b7cbbf2c6583a991f657b4aa89f97f93f7716191e2de68f9790148b090b744c75999893c00e4ff9b91b3d497c572acdb14eea1b2452ff639b7a9b0ac84f36642ea74c70c45d912b6d48158e75c72ff0fd924da0ae8bdaf445df56301ae"}, 0xcc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x60000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr="00000000000200"}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 17:47:19 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x200, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) socketpair(0x1d, 0xa, 0x80, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e23, 0x2, @remote, 0x9}}, 0x0, 0x8001}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={r2, 0x8}, 0x8) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) sendmmsg(r0, &(0x7f0000000440), 0x0, 0x20048861) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f00000002c0)='wireguard\x00') vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1) close(0xffffffffffffffff) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0x9, &(0x7f0000000340)={&(0x7f0000000680)=ANY=[@ANYBLOB="38b71000", @ANYRES16=r4, @ANYRESOCT], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20040002) 17:47:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000505d20680648c63940d0424fc60040012400a001800053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 216.696873][ T9822] netlink: 'syz-executor.1': attribute type 8 has an invalid length. [ 216.713579][ T9822] netlink: 16638 bytes leftover after parsing attributes in process `syz-executor.1'. 17:47:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000505d20680648c63940d0424fc60040012400a001800053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 216.793726][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 216.854813][ T9829] netlink: 'syz-executor.1': attribute type 8 has an invalid length. [ 216.892820][ T9829] netlink: 16638 bytes leftover after parsing attributes in process `syz-executor.1'. 17:47:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000024000505d20680648c63940d0424fc60040012400a001800053582c137153e370907088000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 17:47:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) accept(r1, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz1', "0568fe7f2c77269618d5c947734cbd065c43ade2cb00decb63d58208b63a0c05b2e8580411a87ef571bfb47849e5bf4529599bce558ba2c513e2f66ecda039e06acd66023a153356d4438f0371898c0b1609b6e8a75e7d96d175d80e5a29007af9d47cb037fe2e0e4feaa1b7cbbf2c6583a991f657b4aa89f97f93f7716191e2de68f9790148b090b744c75999893c00e4ff9b91b3d497c572acdb14eea1b2452ff639b7a9b0ac84f36642ea74c70c45d912b6d48158e75c72ff0fd924da0ae8bdaf445df56301ae"}, 0xcc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x60000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr="00000000000200"}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 17:47:20 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x200, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) socketpair(0x1d, 0xa, 0x80, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e23, 0x2, @remote, 0x9}}, 0x0, 0x8001}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={r2, 0x8}, 0x8) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) sendmmsg(r0, &(0x7f0000000440), 0x0, 0x20048861) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f00000002c0)='wireguard\x00') vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1) close(0xffffffffffffffff) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) sendmsg$WG_CMD_GET_DEVICE(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0x9, &(0x7f0000000340)={&(0x7f0000000680)=ANY=[@ANYBLOB="38b71000", @ANYRES16=r4, @ANYRESOCT], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20040002) [ 216.976721][ T9833] netlink: 'syz-executor.1': attribute type 8 has an invalid length. [ 216.999646][ T9833] netlink: 16638 bytes leftover after parsing attributes in process `syz-executor.1'. 17:47:20 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfba1133f8fc07f7b, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 17:47:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) accept(r1, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz1', "0568fe7f2c77269618d5c947734cbd065c43ade2cb00decb63d58208b63a0c05b2e8580411a87ef571bfb47849e5bf4529599bce558ba2c513e2f66ecda039e06acd66023a153356d4438f0371898c0b1609b6e8a75e7d96d175d80e5a29007af9d47cb037fe2e0e4feaa1b7cbbf2c6583a991f657b4aa89f97f93f7716191e2de68f9790148b090b744c75999893c00e4ff9b91b3d497c572acdb14eea1b2452ff639b7a9b0ac84f36642ea74c70c45d912b6d48158e75c72ff0fd924da0ae8bdaf445df56301ae"}, 0xcc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x60000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr="00000000000200"}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 17:47:20 executing program 5: r0 = socket(0x40000000002, 0x3, 0x49) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0x9, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0xd4) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000000)=0x6bc, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 217.164038][ T9844] IPVS: ftp: loaded support on port[0] = 21 [ 217.250312][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 217.366537][ T9857] raw_sendmsg: syz-executor.5 forgot to set AF_INET. Fix it! [ 217.379339][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:47:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x6, 0x4, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") clock_gettime(0xb, &(0x7f0000000300)) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xc5}, 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x2, &(0x7f00000005c0)=ANY=[@ANYRESDEC=r0], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0x78) 17:47:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$l2tp(0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) accept(r1, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)={'syz1', "0568fe7f2c77269618d5c947734cbd065c43ade2cb00decb63d58208b63a0c05b2e8580411a87ef571bfb47849e5bf4529599bce558ba2c513e2f66ecda039e06acd66023a153356d4438f0371898c0b1609b6e8a75e7d96d175d80e5a29007af9d47cb037fe2e0e4feaa1b7cbbf2c6583a991f657b4aa89f97f93f7716191e2de68f9790148b090b744c75999893c00e4ff9b91b3d497c572acdb14eea1b2452ff639b7a9b0ac84f36642ea74c70c45d912b6d48158e75c72ff0fd924da0ae8bdaf445df56301ae"}, 0xcc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x60000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @rand_addr="00000000000200"}, 0x1c) r4 = accept4(r0, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 17:47:20 executing program 5: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r5, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x3, 0x0, [], [{0x7, 0xc2, 0x4, 0x1, 0x1000, 0xcb}, {0x7, 0x43, 0x14, 0x6, 0x8, 0x10000}], [[], [], []]}) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 217.593644][ T9844] IPVS: ftp: loaded support on port[0] = 21 [ 217.760311][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 17:47:21 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfba1133f8fc07f7b, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 17:47:21 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfba1133f8fc07f7b, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) [ 217.904620][ T9887] IPVS: ftp: loaded support on port[0] = 21 17:47:21 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfba1133f8fc07f7b, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) [ 217.955321][ T9889] IPVS: ftp: loaded support on port[0] = 21 [ 217.977511][ T344] tipc: TX() has been purged, node left! [ 218.097417][ T9894] IPVS: ftp: loaded support on port[0] = 21 17:47:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x3}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000000c0)={'wg0\x00'}) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000001c0)={'batadv_slave_0\x00', {0x2, 0x4e22, @loopback}}) ioctl(r0, 0x8b32, &(0x7f0000000040)) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002a000000e8bd6efb250009000e000100400000ff050005001201", 0x2e}], 0x1}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000240)={{{@in=@broadcast, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@rand_addr="683ad86cd0e058959e3a11680c3716ac", 0x0, 0x33}, 0xa, @in, 0x0, 0x1}}, 0xe8) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000200), 0x4) connect$inet6(r3, &(0x7f0000000a40)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r3, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000580)=@in={0x2, 0x4e21, @broadcast}, 0x80, 0x0}}], 0x4000000000000e5, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000000c0)={r6, @in6={{0xa, 0x4e23, 0x1, @local, 0x1f}}, 0x3, 0x4, 0x0, 0x1, 0xffff}, &(0x7f0000000180)=0x98) [ 218.232701][ T9898] batman_adv: batadv0: Interface deactivated: batadv_slave_0 17:47:21 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfba1133f8fc07f7b, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 17:47:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000200000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) socket(0x2, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xc}, {}, {0xfff1}}, [@filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x8, 0x2, [@TCA_FW_POLICE={0x4}]}}]}, 0x34}}, 0x0) [ 218.412619][ T9905] IPVS: ftp: loaded support on port[0] = 21 17:47:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x2cd3}]}, 0x28}}, 0x0) 17:47:21 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x4e21, @multicast1}], 0x10) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000040)=0x10, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="345766ae626070d034aaabc421ae20cc2631661f2299b844fc41a8308971a6fa30a44b3ba167c221f041f98954b08e5e8df44a58e8b70842bdea47f890f3a9e88712ea835c752e1a07884e4acff7ab7811c7a63943a2feb03bcbe3a7a3fdaf8706418f481e0bc8e7f9f67449b50ebd63c9fc0eba18e56918730620f5713b0b5aef955bbc1906b3a7c012ea3eb6a86c912e903f01738288e0a5b8078a22a1f7b20b5bb6f3b342febfa9bf0b80ec9b219a159cbbc4c05dc95176fc108331a6ffb28ce9f9ebe8e58b888972035212b9314127ac668c2221897a024e4dc040a1eb", @ANYRES32=0x0], &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, 0x4) 17:47:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="080dcf055e0bcfe847a071") bind(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000080000004000000a8040000e8020000d000000000000000e802000000000000d8030000d8030000d8030000d8030000d803000004000000", @ANYPTR, @ANYBLOB="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"], 0x3) r2 = socket(0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r5}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) getpeername(r3, &(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000380)=0x80) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400)='ethtool\x00') r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r10, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r12 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r9, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r12, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r11}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r9, 0x8933, &(0x7f0000000440)={'wg1\x00', 0x0}) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r15, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) r17 = socket$nl_route(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r19, @ANYBLOB="0000000000000000140012000c000100627269646765000004000200"], 0x34}}, 0x0) sendmsg$nl_route(r14, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_MASTER={0x8, 0xa, r19}]}, 0x28}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000c00)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) r21 = socket$nl_route(0x10, 0x3, 0x0) r22 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r22, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r26, @ANYBLOB="0000000000000000140012000c000100627269646765000004000200"], 0x34}}, 0x0) sendmsg$nl_route(r21, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r23}, [@IFLA_MASTER={0x8, 0xa, r26}]}, 0x28}}, 0x0) r27 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r27, 0x8933, &(0x7f00000000c0)={'wg0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r27, 0x8933, &(0x7f0000000d40)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r7, &(0x7f0000000f40)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000f00)={&(0x7f0000000d80)={0x15c, r8, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r19}]}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r20}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r26}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r28}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x24000084}, 0x8010) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x1, 0x6, 0xe5, 0x81, 0x2a, 0x8, 0x1f}, &(0x7f0000000000)=0x9c) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000040)={0x1ff, 0x8005, 0xfffffffa, 0x0, r29}, 0x10) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 17:47:22 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfba1133f8fc07f7b, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 17:47:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r4, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r3}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) sendto(r1, &(0x7f0000000200)="874d528c78753c994711b9d28b354502755b3c721970d88c6afa062774d1171733af010bf5093c743473771cfc8c6262d83e5c2f156e9aff8939bcd912dbf287267b89847567839207074bf7571c8f8de1136170665bb8848831c20fcfaa94c43ca027bd3a75654a9b099137e4b1cecad2995603551e544df92910cd8ff1bc5abb6a33d81c58595b38938a183aeb09b0a79b7622c27ea9cd7568ea13a68cd667d77e9e8920f1beacc430693d318a4f80f0bd3a997e5dd5f5d4d8bb6034819b59d60fbbde8751caf71452bd42dc4b0e5189df2360049a4014ddd6c40fa3", 0xdd, 0x0, &(0x7f0000000140)=@nfc={0x27, 0x1, 0x1, 0x7}, 0x80) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f00000000c0)={'wg0\x00'}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000000c0)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="5c00000007060102e3ffffffffffffff0c0000080900020073797a30000000000900020073797a32000000000800060afb44fdffffffff000700000009000200ad797a32002000000900020073797a30000000000500010007000000"], 0x5c}, 0x1, 0x0, 0x0, 0x8011}, 0x20000000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB='\x00'], 0x3}}, 0x0) sendfile(r7, r6, 0x0, 0x100000001) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl(r9, 0x1001000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 218.754323][ T9925] sctp: [Deprecated]: syz-executor.3 (pid 9925) Use of int in maxseg socket option. [ 218.754323][ T9925] Use struct sctp_assoc_value instead [ 218.764249][ T9923] xt_SECMARK: invalid mode: 16 17:47:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) r1 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt(r1, 0x7, 0x9, &(0x7f0000000000)=""/170, &(0x7f00000000c0)=0xaa) close(r0) [ 218.813781][ T9929] IPVS: ftp: loaded support on port[0] = 21 [ 218.872031][ T9923] bridge1: port 1(team0) entered blocking state [ 218.910213][ T9923] bridge1: port 1(team0) entered disabled state [ 218.955123][ T9923] device team0 entered promiscuous mode [ 218.977343][ T9923] device team_slave_0 entered promiscuous mode [ 218.988967][ T27] kauditd_printk_skb: 3 callbacks suppressed 17:47:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10020804}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x7, 0x1, 0x401, 0x0, 0x0, {0xc, 0x0, 0x3}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4810) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r3 = socket$netlink(0x10, 0x3, 0x4) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0x12ca) [ 218.988980][ T27] audit: type=1804 audit(1583948842.290:31): pid=9940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir391830332/syzkaller.BrhjDZ/18/cgroup.controllers" dev="sda1" ino=16566 res=1 [ 219.033383][ T9923] device team_slave_1 entered promiscuous mode 17:47:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="080dcf055e0bcfe847a071") bind(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000080000004000000a8040000e8020000d000000000000000e802000000000000d8030000d8030000d8030000d8030000d803000004000000", @ANYPTR, @ANYBLOB="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"], 0x3) r2 = socket(0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r5}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) getpeername(r3, &(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000380)=0x80) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400)='ethtool\x00') r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r10, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r12 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r9, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r12, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r11}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r9, 0x8933, &(0x7f0000000440)={'wg1\x00', 0x0}) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r15, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) r17 = socket$nl_route(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r19, @ANYBLOB="0000000000000000140012000c000100627269646765000004000200"], 0x34}}, 0x0) sendmsg$nl_route(r14, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_MASTER={0x8, 0xa, r19}]}, 0x28}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000c00)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) r21 = socket$nl_route(0x10, 0x3, 0x0) r22 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r22, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r26, @ANYBLOB="0000000000000000140012000c000100627269646765000004000200"], 0x34}}, 0x0) sendmsg$nl_route(r21, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r23}, [@IFLA_MASTER={0x8, 0xa, r26}]}, 0x28}}, 0x0) r27 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r27, 0x8933, &(0x7f00000000c0)={'wg0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r27, 0x8933, &(0x7f0000000d40)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r7, &(0x7f0000000f40)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000f00)={&(0x7f0000000d80)={0x15c, r8, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r19}]}, @ETHTOOL_A_LINKINFO_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r20}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r26}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r28}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x24000084}, 0x8010) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @loopback}}, 0x1, 0x6, 0xe5, 0x81, 0x2a, 0x8, 0x1f}, &(0x7f0000000000)=0x9c) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000040)={0x1ff, 0x8005, 0xfffffffa, 0x0, r29}, 0x10) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 17:47:22 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfba1133f8fc07f7b, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 17:47:22 executing program 2: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfba1133f8fc07f7b, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) [ 219.234041][ T9956] xt_SECMARK: invalid mode: 16 [ 219.287650][ T9960] IPVS: ftp: loaded support on port[0] = 21 [ 219.344622][ T9964] IPVS: ftp: loaded support on port[0] = 21 [ 219.400431][ T9954] device team0 left promiscuous mode [ 219.405812][ T9954] device team_slave_0 left promiscuous mode [ 219.421885][ T9954] device team_slave_1 left promiscuous mode [ 219.433650][ T9954] bridge1: port 1(team0) entered disabled state 17:47:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r4, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r3}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) sendto(r1, &(0x7f0000000200)="874d528c78753c994711b9d28b354502755b3c721970d88c6afa062774d1171733af010bf5093c743473771cfc8c6262d83e5c2f156e9aff8939bcd912dbf287267b89847567839207074bf7571c8f8de1136170665bb8848831c20fcfaa94c43ca027bd3a75654a9b099137e4b1cecad2995603551e544df92910cd8ff1bc5abb6a33d81c58595b38938a183aeb09b0a79b7622c27ea9cd7568ea13a68cd667d77e9e8920f1beacc430693d318a4f80f0bd3a997e5dd5f5d4d8bb6034819b59d60fbbde8751caf71452bd42dc4b0e5189df2360049a4014ddd6c40fa3", 0xdd, 0x0, &(0x7f0000000140)=@nfc={0x27, 0x1, 0x1, 0x7}, 0x80) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f00000000c0)={'wg0\x00'}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f00000000c0)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="5c00000007060102e3ffffffffffffff0c0000080900020073797a30000000000900020073797a32000000000800060afb44fdffffffff000700000009000200ad797a32002000000900020073797a30000000000500010007000000"], 0x5c}, 0x1, 0x0, 0x0, 0x8011}, 0x20000000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB='\x00'], 0x3}}, 0x0) sendfile(r7, r6, 0x0, 0x100000001) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl(r9, 0x1001000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 219.574920][ T9961] bridge2: port 1(team0) entered blocking state [ 219.602483][ T9961] bridge2: port 1(team0) entered disabled state [ 219.651551][ T9961] device team0 entered promiscuous mode [ 219.668242][ T9961] device team_slave_0 entered promiscuous mode [ 219.683401][ T9961] device team_slave_1 entered promiscuous mode 17:47:23 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) listen(r1, 0x81) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r2, 0x0, 0x100000001) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r4}, @map={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r7, r6, 0x0, 0x100000001) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r7}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0x101, 0x8000, 0x7fffffff, 0x4}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 17:47:23 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfba1133f8fc07f7b, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) [ 219.878299][ T9981] IPVS: ftp: loaded support on port[0] = 21 [ 219.884544][ T27] audit: type=1804 audit(1583948843.170:32): pid=9976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir391830332/syzkaller.BrhjDZ/19/cgroup.controllers" dev="sda1" ino=16567 res=1 [ 219.889943][ T9983] IPVS: ftp: loaded support on port[0] = 21 17:47:23 executing program 3: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004f40)=[{{&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) socketpair(0x0, 0x0, 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0xf000) sendfile(r0, r1, 0x0, 0xf03b0000) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='pids.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) sendfile(r3, r4, 0x0, 0xf03b0000) mmap(&(0x7f0000bcd000/0x3000)=nil, 0x3000, 0x0, 0x4010, r4, 0x710a2000) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) getpid() accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) socket$inet6(0xa, 0x80003, 0x6f) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCX25GCAUSEDIAG(r5, 0x89e6, &(0x7f0000000940)) r6 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x12, r6, 0x0) sendto$inet6(r6, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write(r6, &(0x7f0000004400)="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", 0x1000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r6, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) 17:47:23 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xfba1133f8fc07f7b, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x34}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x14, 0x2, 0x8, 0x101}, 0x14}}, 0x0) 17:47:23 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x7a05, 0x1700) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r7, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r6}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x9) bind$alg(r3, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") [ 220.321327][ T9990] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 220.322632][ T9992] IPVS: ftp: loaded support on port[0] = 21 [ 220.360076][ T9984] IPVS: ftp: loaded support on port[0] = 21 17:47:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r5}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) write$cgroup_int(r7, &(0x7f0000000380), 0x1040c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r7, 0x660c) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) r8 = socket$netlink(0x10, 0x3, 0x0) ioctl(r8, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0xfe6f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0, 0x0, 0x3}) 17:47:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000024000535d25a80648c63940d0224fc60100002400a000200053582c137153e370a00018003001700d1bd", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x1, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x4000000) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x80}, 0x200408c0) 17:47:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r5}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) write$cgroup_int(r7, &(0x7f0000000380), 0x1040c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r7, 0x660c) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) r8 = socket$netlink(0x10, 0x3, 0x0) ioctl(r8, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0xfe6f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0, 0x0, 0x3}) 17:47:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r5}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) write$cgroup_int(r7, &(0x7f0000000380), 0x1040c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r7, 0x660c) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) r8 = socket$netlink(0x10, 0x3, 0x0) ioctl(r8, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0xfe6f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0, 0x0, 0x3}) 17:47:24 executing program 3: socket$vsock_stream(0x28, 0x1, 0x0) r0 = accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r1 = socket(0x2, 0x1, 0x6) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000002c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000240)={0x68, r5, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4800}, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000580)=0x80) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000700)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r6, &(0x7f00000007c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x70400c90}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000", @ANYRES16=r7, @ANYBLOB="100025bd70010900002503"], 0x3}}, 0xb0f12da7ed8caacf) sendmsg$NLBL_UNLABEL_C_STATICLIST(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r7, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0xa804) recvfrom$netrom(r0, &(0x7f0000000840)=""/4096, 0x1000, 0x2, &(0x7f00000000c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r10 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r8, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB='+\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="0b3e0000000000000000240000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=r10, @ANYBLOB], 0x3c}}, 0x0) 17:47:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r5}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) write$cgroup_int(r7, &(0x7f0000000380), 0x1040c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r7, 0x660c) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) r8 = socket$netlink(0x10, 0x3, 0x0) ioctl(r8, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0xfe6f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0, 0x0, 0x3}) [ 220.962466][T10022] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. 17:47:24 executing program 3: socket$vsock_stream(0x28, 0x1, 0x0) r0 = accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r1 = socket(0x2, 0x1, 0x6) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000002c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000240)={0x68, r5, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4800}, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000580)=0x80) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000700)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r6, &(0x7f00000007c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x70400c90}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000", @ANYRES16=r7, @ANYBLOB="100025bd70010900002503"], 0x3}}, 0xb0f12da7ed8caacf) sendmsg$NLBL_UNLABEL_C_STATICLIST(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r7, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}]}, 0x28}, 0x1, 0x0, 0x0, 0x804}, 0xa804) recvfrom$netrom(r0, &(0x7f0000000840)=""/4096, 0x1000, 0x2, &(0x7f00000000c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') r10 = gettid() sendmsg$DEVLINK_CMD_RELOAD(r8, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB='+\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="0b3e0000000000000000240000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=r10, @ANYBLOB], 0x3c}}, 0x0) [ 221.167570][T10030] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.3'. [ 221.976792][ T344] tipc: TX() has been purged, node left! [ 221.982632][ T344] tipc: TX() has been purged, node left! [ 221.989197][ T344] tipc: TX() has been purged, node left! [ 221.994900][ T344] tipc: TX() has been purged, node left! [ 222.186826][ T344] tipc: TX() has been purged, node left! [ 222.366851][ T344] tipc: TX() has been purged, node left! 17:47:25 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) listen(r1, 0x81) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r2, 0x0, 0x100000001) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r4}, @map={0x18, 0x0, 0x1, 0x0, r5}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r7, r6, 0x0, 0x100000001) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r7}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0x101, 0x8000, 0x7fffffff, 0x4}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) 17:47:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r6, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r5}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) write$cgroup_int(r7, &(0x7f0000000380), 0x1040c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r7, 0x660c) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0x1732) r8 = socket$netlink(0x10, 0x3, 0x0) ioctl(r8, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRESOCT], 0xfe6f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x0, r0, 0x0, 0x3}) 17:47:25 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10) write$binfmt_misc(r2, &(0x7f0000000340)={'syz0', "1c9f56100ed09178cbc1b669f82068aa520c71c5d6e484207c8cb18f2975bcbf272814d05ff0608cea871e5a443838c83aab33d4d809cfcfc26f23c57c23af67d1fd5a35f30a0a7a2c7c93d0725298ba9c56d8aee9917675cbbcd9c24bb16f6d7ab001d225bc794ccbd0a93ef960bd2d7b0128546611cc84832dfe71a4e526b596ed610e56b62c771f0b71ae80b60b3bc5d86d8d42b114715c8677f6aa90df969f67feee35219a5554dbdaf93a456b16f1652860235f29b84f7a4d3459ee7cb5fe36e4c8f1bb756e6abcba427ded13b3d979690f0c57f1c2bce5383fff2c2a985a25e8d2054391610fb7eee2c62344890b8e"}, 0xf6) r3 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x208e24b) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000080)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNADDRESOURCE(r6, 0x89e0, &(0x7f0000000500)=0x1ff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f00000000c0)={'wg0\x00'}) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000200)={0xffffffffffffffff, r5, 0x3, 0x2f, &(0x7f0000000100)="7ee8d1b92b2acee17459e1fb04b1fa8eb5c857523ee0d62a09c2aa8af02a3411de04be32b4909783db98837863d388", 0x4, 0x0, 0xfff, 0x1ff, 0x5, 0x1, 0x7, 'syz0\x00'}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) getsockopt$inet_mreq(r3, 0x0, 0x24, &(0x7f0000000000)={@multicast1, @empty}, &(0x7f0000000040)=0x8) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={{0x14}, [], {0x14}}, 0x620}, 0x1, 0x0, 0x0, 0x7c125c50695196e6}, 0x80) 17:47:25 executing program 4: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) ioctl$int_in(r2, 0x5421, &(0x7f00000000c0)=0x1) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf3, 0x21fc}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffd83) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) r7 = syz_genetlink_get_family_id$wireguard(&(0x7f00000001c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000100)={0x68, r7, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r6}, @WGDEVICE_A_PEERS={0x4c, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g='\xd1s(\x99\xf6\x11\xcd\x89\x94\x03M\x7fA=\xc9Wc\x0eT\x93\xc2\x85\xac\xa4\x00e\xcbc\x11\xbeik'}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @dev}}]}]}]}, 0x68}}, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) splice(r0, 0x0, r3, 0x0, 0x10003, 0x0) 17:47:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001